Analysis
-
max time kernel
28s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2023 11:23
Behavioral task
behavioral1
Sample
34242398be6a80b536ac21be06f7d2ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
34242398be6a80b536ac21be06f7d2ec.exe
Resource
win10v2004-20230221-en
General
-
Target
34242398be6a80b536ac21be06f7d2ec.exe
-
Size
19KB
-
MD5
34242398be6a80b536ac21be06f7d2ec
-
SHA1
91c0b30ad988678182f37a3f4bfa5cfc4a51857c
-
SHA256
085758594b8004ffcd2c0b7413d67c3fd8024d8915aac54b95db59609c7bd55d
-
SHA512
fa597a8ad780f41cf57b2d1c7ab13c1852a654461a790f7e11ff1529b1c03bef9b86f94f760e3aa476e230932be389ee1ed996a8912b28050388336c3b34fcfb
-
SSDEEP
384:t2keTUi5j7+37gHeMF20vvvvvvvvvvvvvvvvvv6svnJCKA6g3N3mSv:t2keD+3SeMFhvvvvvvvvvvvvvvvvvv6P
Malware Config
Extracted
purecrypter
http://purecry.ydns.eu/pure/Oqbokp.dll
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1740 set thread context of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 34242398be6a80b536ac21be06f7d2ec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28 PID 1740 wrote to memory of 1060 1740 34242398be6a80b536ac21be06f7d2ec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\34242398be6a80b536ac21be06f7d2ec.exe"C:\Users\Admin\AppData\Local\Temp\34242398be6a80b536ac21be06f7d2ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe2⤵PID:1060
-