Analysis

  • max time kernel
    56s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 17:32

General

  • Target

    9C4EF5E009E8E96631E6C73134506609.exe

  • Size

    6KB

  • MD5

    9c4ef5e009e8e96631e6c73134506609

  • SHA1

    b19ce778b85936e1aeeb6b13a7591177d1d4526b

  • SHA256

    e293ca4ad9388a417b4e8fb38a831df8e943510bd53db4a0f46f1ee6c3133fc3

  • SHA512

    8b733109660a4fd022ec77b259de247d50241d85527ded7a1985dc2f82e9d12d92f964a5f0bd3f3d552a3387e6fc040cccb75eafee81930b972916582b0c45d0

  • SSDEEP

    96:vznFgcGRlhf0K9KgCXRZ2WY+23xS7dYXa1CBzNt:vT9GZP9UT6+mS7dYXECD

Malware Config

Extracted

Family

purecrypter

C2

https://dl.dropboxusercontent.com/s/1mpgaivww6h97gb/Fhhps.dat?dl=0

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe
    "C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe
      C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe
      2⤵
        PID:1228

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1228-1067-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/1228-1068-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/4464-168-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-200-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-137-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-138-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-140-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-142-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-133-0x0000000000BC0000-0x0000000000BC8000-memory.dmp

      Filesize

      32KB

    • memory/4464-146-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-148-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-150-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-152-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-154-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-156-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-158-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-160-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-162-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-164-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-172-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-144-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-136-0x0000000006960000-0x00000000069F2000-memory.dmp

      Filesize

      584KB

    • memory/4464-166-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-174-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-176-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-178-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-180-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-182-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-184-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-186-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-188-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-190-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-192-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-194-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-196-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-198-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-170-0x00000000067A0000-0x0000000006878000-memory.dmp

      Filesize

      864KB

    • memory/4464-1059-0x0000000006CE0000-0x0000000006D46000-memory.dmp

      Filesize

      408KB

    • memory/4464-1060-0x0000000006900000-0x0000000006901000-memory.dmp

      Filesize

      4KB

    • memory/4464-1061-0x0000000005440000-0x0000000005450000-memory.dmp

      Filesize

      64KB

    • memory/4464-135-0x0000000006E30000-0x00000000073D4000-memory.dmp

      Filesize

      5.6MB

    • memory/4464-134-0x0000000005440000-0x0000000005450000-memory.dmp

      Filesize

      64KB