Analysis
-
max time kernel
113s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-02-2023 10:04
Static task
static1
Behavioral task
behavioral1
Sample
bypass_ps1_extracted_pe_file.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bypass_ps1_extracted_pe_file.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
bypass_ps1_extracted_pe_file.exe
-
Size
171KB
-
MD5
b24e714962c627bc153be748efe9d288
-
SHA1
68d9fe8a592534e180db5ec89afe999221e43fec
-
SHA256
8bbf3420ad5b1e7283ecc131dd720728a0ebaba799d9084509c8a47b8efe1cb0
-
SHA512
a4cbf257a3196aac284df85285d224f626689257b525db3fe73b3ff213b4b70a171e40e836760d93dd70dd78e142ff564f9bf678bb4010452bfcd3853bac340b
-
SSDEEP
1536:g1c9URWzKr7PhuuUpV7+5JTiy95BuUCQahsf5mZIWiwwr7QXsouW2ASDDA6rRSCM:g1pWaxa7Dy95pS2lzxnIvXtZzSaPnp
Score
10/10
Malware Config
Signatures
-
Detect PureCrypter injector 34 IoCs
resource yara_rule behavioral1/memory/1048-56-0x000000001C560000-0x000000001C842000-memory.dmp family_purecrypter behavioral1/memory/1048-57-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-58-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-60-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-62-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-64-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-66-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-68-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-70-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-72-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-74-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-76-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-78-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-80-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-82-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-84-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-86-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-88-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-90-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-92-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-94-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-96-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-98-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-100-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-102-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-104-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-106-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-108-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-110-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-112-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-114-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-116-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-118-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter behavioral1/memory/1048-120-0x000000001C560000-0x000000001C83C000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 bypass_ps1_extracted_pe_file.exe