Analysis
-
max time kernel
56s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 17:32
Behavioral task
behavioral1
Sample
9C4EF5E009E8E96631E6C73134506609.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9C4EF5E009E8E96631E6C73134506609.exe
Resource
win10v2004-20230220-en
General
-
Target
9C4EF5E009E8E96631E6C73134506609.exe
-
Size
6KB
-
MD5
9c4ef5e009e8e96631e6c73134506609
-
SHA1
b19ce778b85936e1aeeb6b13a7591177d1d4526b
-
SHA256
e293ca4ad9388a417b4e8fb38a831df8e943510bd53db4a0f46f1ee6c3133fc3
-
SHA512
8b733109660a4fd022ec77b259de247d50241d85527ded7a1985dc2f82e9d12d92f964a5f0bd3f3d552a3387e6fc040cccb75eafee81930b972916582b0c45d0
-
SSDEEP
96:vznFgcGRlhf0K9KgCXRZ2WY+23xS7dYXa1CBzNt:vT9GZP9UT6+mS7dYXECD
Malware Config
Extracted
purecrypter
https://dl.dropboxusercontent.com/s/1mpgaivww6h97gb/Fhhps.dat?dl=0
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rgeodqae = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rgeodqae.exe\"" 9C4EF5E009E8E96631E6C73134506609.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4464 set thread context of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4464 9C4EF5E009E8E96631E6C73134506609.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91 PID 4464 wrote to memory of 1228 4464 9C4EF5E009E8E96631E6C73134506609.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe"C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exeC:\Users\Admin\AppData\Local\Temp\9C4EF5E009E8E96631E6C73134506609.exe2⤵PID:1228
-