Resubmissions

28-02-2023 08:35

230228-khdmsaad98 10

27-02-2023 10:04

230227-l39rdsda95 10

Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2023 10:04

General

  • Target

    bypass_ps1_extracted_pe_file.exe

  • Size

    171KB

  • MD5

    b24e714962c627bc153be748efe9d288

  • SHA1

    68d9fe8a592534e180db5ec89afe999221e43fec

  • SHA256

    8bbf3420ad5b1e7283ecc131dd720728a0ebaba799d9084509c8a47b8efe1cb0

  • SHA512

    a4cbf257a3196aac284df85285d224f626689257b525db3fe73b3ff213b4b70a171e40e836760d93dd70dd78e142ff564f9bf678bb4010452bfcd3853bac340b

  • SSDEEP

    1536:g1c9URWzKr7PhuuUpV7+5JTiy95BuUCQahsf5mZIWiwwr7QXsouW2ASDDA6rRSCM:g1pWaxa7Dy95pS2lzxnIvXtZzSaPnp

Malware Config

Signatures

  • Detect PureCrypter injector 33 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bypass_ps1_extracted_pe_file.exe
    "C:\Users\Admin\AppData\Local\Temp\bypass_ps1_extracted_pe_file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sk0lg1xu.wxh.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1524-174-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-396-0x000001AB1F740000-0x000001AB1F750000-memory.dmp

    Filesize

    64KB

  • memory/1524-136-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-176-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-140-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-142-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-144-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-146-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-148-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-150-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-152-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-154-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-156-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-158-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-160-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-162-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-164-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-180-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-168-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-170-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-172-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-133-0x000001AB047A0000-0x000001AB047CE000-memory.dmp

    Filesize

    184KB

  • memory/1524-138-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-178-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-166-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-182-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-184-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-186-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-188-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-190-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-192-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-194-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-196-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-198-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-135-0x000001AB1F890000-0x000001AB1FB6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-10300-0x000001AB1FB70000-0x000001AB1FB92000-memory.dmp

    Filesize

    136KB

  • memory/1524-134-0x000001AB1F740000-0x000001AB1F750000-memory.dmp

    Filesize

    64KB

  • memory/1524-10310-0x000001AB1F740000-0x000001AB1F750000-memory.dmp

    Filesize

    64KB

  • memory/1524-10311-0x000001AB1F740000-0x000001AB1F750000-memory.dmp

    Filesize

    64KB

  • memory/1524-10315-0x000001AB1F740000-0x000001AB1F750000-memory.dmp

    Filesize

    64KB

  • memory/1524-10314-0x000001AB1F740000-0x000001AB1F750000-memory.dmp

    Filesize

    64KB

  • memory/5000-10313-0x000001C2F3A00000-0x000001C2F3A10000-memory.dmp

    Filesize

    64KB

  • memory/5000-10312-0x000001C2F3A00000-0x000001C2F3A10000-memory.dmp

    Filesize

    64KB

  • memory/5000-10316-0x000001C2F3A00000-0x000001C2F3A10000-memory.dmp

    Filesize

    64KB

  • memory/5000-10317-0x000001C2F3A00000-0x000001C2F3A10000-memory.dmp

    Filesize

    64KB