Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2023 11:02
Static task
static1
Behavioral task
behavioral1
Sample
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe
Resource
win10v2004-20230220-en
General
-
Target
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe
-
Size
2.4MB
-
MD5
8f04f8e4f87a7e19053f745b6fbcb795
-
SHA1
5207f1704c26b19ab175882ab03a13aa42f88f48
-
SHA256
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4
-
SHA512
89d372996ecf01293d69267b4c151e59a4dca3968c9f28d5795d620a45232b2ccd3aa29aa87eb540c44d06541d90dbfd5c020c77a0d850e5a4f0eee063a9fe5a
-
SSDEEP
49152:Lp7dJRVGJ0vXg055FGLXBFC/tU6aqws96MayXjq7262LMJfS4h1Y:Lp7dJR0+vXg055FSXBFC1gq9kM3zm0MG
Malware Config
Extracted
redline
red1
34.141.168.40:80
34.125.68.133:80
-
auth_value
70f607e482f39051bebe438c28d43e46
Signatures
-
Detect PureCrypter injector 35 IoCs
resource yara_rule behavioral1/memory/1556-55-0x00000000049C0000-0x0000000004C28000-memory.dmp family_purecrypter behavioral1/memory/1556-57-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-56-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-61-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-59-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-63-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-67-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-65-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-69-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-73-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-75-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-71-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-77-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-79-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-83-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-81-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-85-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-87-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-93-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-91-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-89-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-99-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-97-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-95-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-101-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-107-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-105-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-103-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-119-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-117-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-115-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-113-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-111-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/1556-109-0x00000000049C0000-0x0000000004C22000-memory.dmp family_purecrypter behavioral1/memory/2000-10206-0x0000000002650000-0x0000000002690000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe Token: SeDebugPrivilege 2000 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2000 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 28 PID 1556 wrote to memory of 2000 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 28 PID 1556 wrote to memory of 2000 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 28 PID 1556 wrote to memory of 2000 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 28 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31 PID 1556 wrote to memory of 1888 1556 3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe"C:\Users\Admin\AppData\Local\Temp\3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exeC:\Users\Admin\AppData\Local\Temp\3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4.exe2⤵PID:1888
-