Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2023 12:09

General

  • Target

    8c051812ef24f309b61efc25ec3dcbe2.exe

  • Size

    15KB

  • MD5

    8c051812ef24f309b61efc25ec3dcbe2

  • SHA1

    f0087d289a5cde7b3e691f5c40e3573ef2719b46

  • SHA256

    709901b9f87a31d0410d37973ecf94d76cca383dbcaf4402099080738caecfee

  • SHA512

    79df9c7693fa8e22093a201581922c1099c5d1aff822dfc2b9eba49f30ee5723a71a3f099ba6bdcfb8c3fa7d6c386a610957ce98354751043de2e9a7d5dbb7a8

  • SSDEEP

    384:u5MjRSSfunEq7uthXwQFk/3rhfewHwWAxW:cMVS8652XwQFkfrB4

Malware Config

Extracted

Family

purecrypter

C2

https://mahmoodonline.com/panel/uploads/Uurvvpfbldd.pdf

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c051812ef24f309b61efc25ec3dcbe2.exe
    "C:\Users\Admin\AppData\Local\Temp\8c051812ef24f309b61efc25ec3dcbe2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1724-54-0x00000000000B0000-0x00000000000BA000-memory.dmp

    Filesize

    40KB

  • memory/1724-55-0x0000000001D70000-0x0000000001DB0000-memory.dmp

    Filesize

    256KB