Analysis
-
max time kernel
75s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04-04-2023 09:03
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
3.exe
-
Size
3.1MB
-
MD5
a250763ca9419cce8d12b2bff06c9cec
-
SHA1
12337290c7b6b4537a0ffcfa24c6089fcab06e34
-
SHA256
17d9ea316738afcac65b55560be4b85d1add5df729474aba804b39fe4123d9b5
-
SHA512
c361ca24e0616cea772a4ad3669f740ed7d36d8ac6a9d7f203d236ad1031b69e5ccbad3d474770b326e97372af2a81b10da50170b3fe9244974b4acbe15c06c0
-
SSDEEP
49152:ddjqq/hVlVc7X5WOSxf8CHAdXA8YRFiamKcgJ0JLzxB9aWkSyI:dddvcr5WHf8yAy8AijK30dzD9aWf
Score
10/10
Malware Config
Signatures
-
Detect PureCrypter injector 34 IoCs
resource yara_rule behavioral1/memory/1972-55-0x0000000004D30000-0x0000000005054000-memory.dmp family_purecrypter behavioral1/memory/1972-57-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-58-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-60-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-62-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-64-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-66-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-68-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-70-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-72-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-74-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-76-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-78-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-80-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-82-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-84-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-86-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-88-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-90-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-92-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-94-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-96-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-98-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-100-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-102-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-104-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-106-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-108-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-110-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-112-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-114-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-116-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-118-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter behavioral1/memory/1972-120-0x0000000004D30000-0x000000000504E000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 3.exe