Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-06-2023 15:13

General

  • Target

    0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781.exe

  • Size

    350KB

  • MD5

    5988969e8579949efde31126b36839a6

  • SHA1

    fd6ca1bf659f2c472564857209233aa6ebec9cd6

  • SHA256

    0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781

  • SHA512

    25cd5a2b1ea03ebc72d5111905a5ae10641c8024d6ac44895771402e3696ed12b6bf007d4ee43c8ed2d3dae8120444619da165723837d52f6f8826f9c9b05245

  • SSDEEP

    6144:OVXpQXInUH9i88qBoMncqou5yCIAyPCLro3nFTFkZJnODxC8rRXYcQPq2wBhp1:OV+XInUH9i88qBoMcqdw9WOTrv2wBr

Malware Config

Extracted

Family

purecrypter

C2

http://cleaning.homesecuritypc.com/packages/Ikucx.dat

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781.exe
        "C:\Users\Admin\AppData\Local\Temp\0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          3⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • outlook_office_path
          • outlook_win_path
          PID:4108
          • C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe
            "C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2968
            • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe
              "C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2896
            • C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe
              C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3876
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe

      Filesize

      6KB

      MD5

      8af1d478704d9528f08b2fffa5f47440

      SHA1

      c140a7ac7eed24afd65adca65d930553c481602e

      SHA256

      ceff3cbf74efe2ddbb8faa4a651d5d0a8bed637774e7c755e467cb5dc0174c48

      SHA512

      d6c1677a35b35dd0994b2a8e2970fa59351a0a0f1a1bf43448ee1fe694e825d63d1bfadab7b723d1d76984aa0b9ea3994b6442686264ade67005b0754ec63855

    • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe

      Filesize

      6KB

      MD5

      8af1d478704d9528f08b2fffa5f47440

      SHA1

      c140a7ac7eed24afd65adca65d930553c481602e

      SHA256

      ceff3cbf74efe2ddbb8faa4a651d5d0a8bed637774e7c755e467cb5dc0174c48

      SHA512

      d6c1677a35b35dd0994b2a8e2970fa59351a0a0f1a1bf43448ee1fe694e825d63d1bfadab7b723d1d76984aa0b9ea3994b6442686264ade67005b0754ec63855

    • C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe

      Filesize

      6KB

      MD5

      4f0d3017e1d6e4c39f83a3e550e26c11

      SHA1

      6f6c966cf3465b48f86ce3b9befb47a209dbd1dd

      SHA256

      36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120

      SHA512

      2a1fb15339f192d05b958daa36da0e2f20aefeb396148a98696b8c2d4c15ed6d036b304f1fb4078fe12a257b774b8fc74131c3ac420d548f29ec5582076943fa

    • C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe

      Filesize

      6KB

      MD5

      4f0d3017e1d6e4c39f83a3e550e26c11

      SHA1

      6f6c966cf3465b48f86ce3b9befb47a209dbd1dd

      SHA256

      36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120

      SHA512

      2a1fb15339f192d05b958daa36da0e2f20aefeb396148a98696b8c2d4c15ed6d036b304f1fb4078fe12a257b774b8fc74131c3ac420d548f29ec5582076943fa

    • C:\Users\Admin\AppData\Local\Temp\Zqyyt.exe

      Filesize

      6KB

      MD5

      4f0d3017e1d6e4c39f83a3e550e26c11

      SHA1

      6f6c966cf3465b48f86ce3b9befb47a209dbd1dd

      SHA256

      36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120

      SHA512

      2a1fb15339f192d05b958daa36da0e2f20aefeb396148a98696b8c2d4c15ed6d036b304f1fb4078fe12a257b774b8fc74131c3ac420d548f29ec5582076943fa

    • memory/2896-5132-0x0000020D6F1B0000-0x0000020D6F1C0000-memory.dmp

      Filesize

      64KB

    • memory/2896-5131-0x0000020D6F1A0000-0x0000020D6F1A1000-memory.dmp

      Filesize

      4KB

    • memory/2896-5130-0x0000020D70D00000-0x0000020D70DDA000-memory.dmp

      Filesize

      872KB

    • memory/2896-4193-0x0000020D714C0000-0x0000020D7160E000-memory.dmp

      Filesize

      1.3MB

    • memory/2896-4192-0x0000020D6F1B0000-0x0000020D6F1C0000-memory.dmp

      Filesize

      64KB

    • memory/2896-4185-0x0000020D6ED20000-0x0000020D6ED26000-memory.dmp

      Filesize

      24KB

    • memory/2968-4177-0x00000000067F0000-0x000000000685A000-memory.dmp

      Filesize

      424KB

    • memory/2968-3249-0x0000000000D50000-0x0000000000D58000-memory.dmp

      Filesize

      32KB

    • memory/2968-4178-0x00000000068F0000-0x0000000006956000-memory.dmp

      Filesize

      408KB

    • memory/2968-4179-0x0000000005590000-0x00000000055A0000-memory.dmp

      Filesize

      64KB

    • memory/2968-4176-0x0000000005E10000-0x0000000005E11000-memory.dmp

      Filesize

      4KB

    • memory/2968-3253-0x00000000066E0000-0x0000000006772000-memory.dmp

      Filesize

      584KB

    • memory/2968-3252-0x0000000006AE0000-0x0000000006FDE000-memory.dmp

      Filesize

      5.0MB

    • memory/2968-3251-0x00000000064F0000-0x00000000065CE000-memory.dmp

      Filesize

      888KB

    • memory/2968-3250-0x0000000005590000-0x00000000055A0000-memory.dmp

      Filesize

      64KB

    • memory/3876-4191-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/3876-5104-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/4108-1048-0x0000000140000000-0x00000001400D0000-memory.dmp

      Filesize

      832KB

    • memory/4108-3236-0x000001E480300000-0x000001E48037A000-memory.dmp

      Filesize

      488KB

    • memory/4108-3217-0x000001E480270000-0x000001E480296000-memory.dmp

      Filesize

      152KB

    • memory/4108-3216-0x000001E480070000-0x000001E48010E000-memory.dmp

      Filesize

      632KB

    • memory/4108-3201-0x000001E4E61C0000-0x000001E4E61D0000-memory.dmp

      Filesize

      64KB

    • memory/4108-1049-0x000001E4E61C0000-0x000001E4E61D0000-memory.dmp

      Filesize

      64KB

    • memory/4108-1050-0x000001E4FE9B0000-0x000001E4FEAB6000-memory.dmp

      Filesize

      1.0MB

    • memory/4208-147-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-155-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-175-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-177-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-179-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-181-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-183-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-1042-0x0000018C918B0000-0x0000018C918B1000-memory.dmp

      Filesize

      4KB

    • memory/4208-1043-0x0000018CABE00000-0x0000018CABEF8000-memory.dmp

      Filesize

      992KB

    • memory/4208-1044-0x0000018C91900000-0x0000018C9194C000-memory.dmp

      Filesize

      304KB

    • memory/4208-1045-0x0000018C91820000-0x0000018C91830000-memory.dmp

      Filesize

      64KB

    • memory/4208-171-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-169-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-167-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-165-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-163-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-161-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-159-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-157-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-173-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-153-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-151-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-149-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-117-0x0000018C91470000-0x0000018C914CC000-memory.dmp

      Filesize

      368KB

    • memory/4208-145-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-143-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-141-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-139-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-137-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-135-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-133-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-131-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-129-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-127-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-125-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-123-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-121-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-120-0x0000018CABC20000-0x0000018CABD85000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-119-0x0000018CABC20000-0x0000018CABD8C000-memory.dmp

      Filesize

      1.4MB

    • memory/4208-118-0x0000018C91820000-0x0000018C91830000-memory.dmp

      Filesize

      64KB