Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2023 00:48
Behavioral task
behavioral1
Sample
78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe
Resource
win10v2004-20230220-en
General
-
Target
78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe
-
Size
110KB
-
MD5
0ede257a56a6b1fbd2b1405568b44015
-
SHA1
bffba8a4cc2ba225b51d1650c3db80198175f842
-
SHA256
78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1
-
SHA512
ca727b6d5ce27efd72193c82b58f8fcae03463a5bcd71c94d02375a5127b69db904b83de8a6c5322ddbf8a40a2ad0719cd053152bff82ede9e4167f3b9285c7c
-
SSDEEP
384:49OYSG2piL6CM9QXr5bCbFxlYh6GmTx3qpWV4U6DPl3YlTloNlvcloNlvAlfYlNP:49OPe29QXr5qFx2YnJqy6CV
Malware Config
Extracted
purecrypter
https://cents-ability.org/loader/uploads/withoutstartup_Wacutryp.jpg
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1908 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3364 78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3364 wrote to memory of 3812 3364 78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe 84 PID 3364 wrote to memory of 3812 3364 78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe 84 PID 3364 wrote to memory of 3812 3364 78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe 84 PID 3812 wrote to memory of 1908 3812 cmd.exe 86 PID 3812 wrote to memory of 1908 3812 cmd.exe 86 PID 3812 wrote to memory of 1908 3812 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe"C:\Users\Admin\AppData\Local\Temp\78ee0644bbe5776bbf4474fa112e69da56a250d40357f7b09ddf09e0de117ea1.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping google.com2⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
PID:1908
-
-