Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2023 11:30
Static task
static1
Behavioral task
behavioral1
Sample
8f04f8e4f87a7e19053f745b6fbcb795.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8f04f8e4f87a7e19053f745b6fbcb795.exe
Resource
win10v2004-20230220-en
General
-
Target
8f04f8e4f87a7e19053f745b6fbcb795.exe
-
Size
2.4MB
-
MD5
8f04f8e4f87a7e19053f745b6fbcb795
-
SHA1
5207f1704c26b19ab175882ab03a13aa42f88f48
-
SHA256
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4
-
SHA512
89d372996ecf01293d69267b4c151e59a4dca3968c9f28d5795d620a45232b2ccd3aa29aa87eb540c44d06541d90dbfd5c020c77a0d850e5a4f0eee063a9fe5a
-
SSDEEP
49152:Lp7dJRVGJ0vXg055FGLXBFC/tU6aqws96MayXjq7262LMJfS4h1Y:Lp7dJR0+vXg055FSXBFC1gq9kM3zm0MG
Malware Config
Extracted
redline
red1
34.141.168.40:80
34.125.68.133:80
-
auth_value
70f607e482f39051bebe438c28d43e46
Signatures
-
Detect PureCrypter injector 35 IoCs
resource yara_rule behavioral1/memory/1364-55-0x0000000004A30000-0x0000000004C98000-memory.dmp family_purecrypter behavioral1/memory/1364-56-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-57-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-59-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-61-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-63-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-65-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-67-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-69-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-71-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-73-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-75-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-77-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-79-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-81-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-83-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-85-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-87-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-89-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-91-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-93-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-95-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-97-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-99-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-101-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-103-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-105-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-107-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-109-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-111-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-113-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-115-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-117-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/1364-119-0x0000000004A30000-0x0000000004C92000-memory.dmp family_purecrypter behavioral1/memory/668-10205-0x00000000003E0000-0x0000000000420000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1364 set thread context of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe Token: SeDebugPrivilege 668 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1364 wrote to memory of 668 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 28 PID 1364 wrote to memory of 668 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 28 PID 1364 wrote to memory of 668 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 28 PID 1364 wrote to memory of 668 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 28 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31 PID 1364 wrote to memory of 1012 1364 8f04f8e4f87a7e19053f745b6fbcb795.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f04f8e4f87a7e19053f745b6fbcb795.exe"C:\Users\Admin\AppData\Local\Temp\8f04f8e4f87a7e19053f745b6fbcb795.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\8f04f8e4f87a7e19053f745b6fbcb795.exeC:\Users\Admin\AppData\Local\Temp\8f04f8e4f87a7e19053f745b6fbcb795.exe2⤵PID:1012
-