Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2023 15:23

General

  • Target

    36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120.exe

  • Size

    6KB

  • MD5

    4f0d3017e1d6e4c39f83a3e550e26c11

  • SHA1

    6f6c966cf3465b48f86ce3b9befb47a209dbd1dd

  • SHA256

    36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120

  • SHA512

    2a1fb15339f192d05b958daa36da0e2f20aefeb396148a98696b8c2d4c15ed6d036b304f1fb4078fe12a257b774b8fc74131c3ac420d548f29ec5582076943fa

  • SSDEEP

    96:eFU+v1uy+5tHd/xR5JNtG1KKqYDal+5zNt:G7653/xfhHRgE+7

Malware Config

Extracted

Family

purecrypter

C2

http://cleaning.homesecuritypc.com/packages/Ikucx.dat

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:784
      • C:\Users\Admin\AppData\Local\Temp\36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120.exe
        "C:\Users\Admin\AppData\Local\Temp\36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe
          "C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Users\Admin\AppData\Local\Temp\Estei.exe
            "C:\Users\Admin\AppData\Local\Temp\Estei.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1136
        • C:\Users\Admin\AppData\Local\Temp\36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120.exe
          C:\Users\Admin\AppData\Local\Temp\36e84f76412889664edcaca6b4d01e3b6f7a23a63d7ab159089bbe3630e05120.exe
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1952
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:5072

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    3
    T1082

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Estei.exe
      Filesize

      6KB

      MD5

      1e60442ffe8d9d91919bf2506e3efc68

      SHA1

      908bd34c30f2baf73245541b9b18bd89d06c8d79

      SHA256

      cf2e48859602e7f7b3a7006a952bd1e3c75f0c6220d9803c10b4220dbd6c1d06

      SHA512

      ae221b72839e01c68cf9b0266d58413a43f8e365f9f455d274099e17ccb6883a23513f0f10d3b3e2b3771c5b09a0fcd5331dad6d2a1e088383188536cd81ef63

    • C:\Users\Admin\AppData\Local\Temp\Estei.exe
      Filesize

      6KB

      MD5

      1e60442ffe8d9d91919bf2506e3efc68

      SHA1

      908bd34c30f2baf73245541b9b18bd89d06c8d79

      SHA256

      cf2e48859602e7f7b3a7006a952bd1e3c75f0c6220d9803c10b4220dbd6c1d06

      SHA512

      ae221b72839e01c68cf9b0266d58413a43f8e365f9f455d274099e17ccb6883a23513f0f10d3b3e2b3771c5b09a0fcd5331dad6d2a1e088383188536cd81ef63

    • C:\Users\Admin\AppData\Local\Temp\Estei.exe
      Filesize

      6KB

      MD5

      1e60442ffe8d9d91919bf2506e3efc68

      SHA1

      908bd34c30f2baf73245541b9b18bd89d06c8d79

      SHA256

      cf2e48859602e7f7b3a7006a952bd1e3c75f0c6220d9803c10b4220dbd6c1d06

      SHA512

      ae221b72839e01c68cf9b0266d58413a43f8e365f9f455d274099e17ccb6883a23513f0f10d3b3e2b3771c5b09a0fcd5331dad6d2a1e088383188536cd81ef63

    • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe
      Filesize

      6KB

      MD5

      8af1d478704d9528f08b2fffa5f47440

      SHA1

      c140a7ac7eed24afd65adca65d930553c481602e

      SHA256

      ceff3cbf74efe2ddbb8faa4a651d5d0a8bed637774e7c755e467cb5dc0174c48

      SHA512

      d6c1677a35b35dd0994b2a8e2970fa59351a0a0f1a1bf43448ee1fe694e825d63d1bfadab7b723d1d76984aa0b9ea3994b6442686264ade67005b0754ec63855

    • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe
      Filesize

      6KB

      MD5

      8af1d478704d9528f08b2fffa5f47440

      SHA1

      c140a7ac7eed24afd65adca65d930553c481602e

      SHA256

      ceff3cbf74efe2ddbb8faa4a651d5d0a8bed637774e7c755e467cb5dc0174c48

      SHA512

      d6c1677a35b35dd0994b2a8e2970fa59351a0a0f1a1bf43448ee1fe694e825d63d1bfadab7b723d1d76984aa0b9ea3994b6442686264ade67005b0754ec63855

    • C:\Users\Admin\AppData\Local\Temp\Ynpbjslfjs.exe
      Filesize

      6KB

      MD5

      8af1d478704d9528f08b2fffa5f47440

      SHA1

      c140a7ac7eed24afd65adca65d930553c481602e

      SHA256

      ceff3cbf74efe2ddbb8faa4a651d5d0a8bed637774e7c755e467cb5dc0174c48

      SHA512

      d6c1677a35b35dd0994b2a8e2970fa59351a0a0f1a1bf43448ee1fe694e825d63d1bfadab7b723d1d76984aa0b9ea3994b6442686264ade67005b0754ec63855

    • memory/1136-2041-0x00000179A3FC0000-0x00000179A3FC6000-memory.dmp
      Filesize

      24KB

    • memory/1136-2506-0x00000179BE460000-0x00000179BE470000-memory.dmp
      Filesize

      64KB

    • memory/1136-2043-0x00000179BE460000-0x00000179BE470000-memory.dmp
      Filesize

      64KB

    • memory/1136-3929-0x00000179A4360000-0x00000179A4361000-memory.dmp
      Filesize

      4KB

    • memory/1384-2557-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-2067-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-2554-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-2065-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-2015-0x000002B613F60000-0x000002B613F61000-memory.dmp
      Filesize

      4KB

    • memory/1384-1974-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-1079-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-1073-0x000002B613BF0000-0x000002B613BF6000-memory.dmp
      Filesize

      24KB

    • memory/1384-2560-0x000002B6157F0000-0x000002B615800000-memory.dmp
      Filesize

      64KB

    • memory/1384-2042-0x000002B62E660000-0x000002B62E710000-memory.dmp
      Filesize

      704KB

    • memory/1952-1753-0x0000000000400000-0x0000000000470000-memory.dmp
      Filesize

      448KB

    • memory/1952-1078-0x0000000000400000-0x0000000000470000-memory.dmp
      Filesize

      448KB

    • memory/4296-158-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-170-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-176-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-178-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-180-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-182-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-184-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-186-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-188-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-192-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-190-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-194-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-198-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-196-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-200-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-1059-0x00000000069F0000-0x0000000006A56000-memory.dmp
      Filesize

      408KB

    • memory/4296-1060-0x0000000005ED0000-0x0000000005ED1000-memory.dmp
      Filesize

      4KB

    • memory/4296-1061-0x0000000005630000-0x0000000005640000-memory.dmp
      Filesize

      64KB

    • memory/4296-172-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-174-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-168-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-166-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-164-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-162-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-160-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-133-0x0000000000C20000-0x0000000000C28000-memory.dmp
      Filesize

      32KB

    • memory/4296-156-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-154-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-152-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-150-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-148-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-146-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-144-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-142-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-140-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-138-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-137-0x00000000065A0000-0x0000000006678000-memory.dmp
      Filesize

      864KB

    • memory/4296-136-0x0000000006790000-0x0000000006822000-memory.dmp
      Filesize

      584KB

    • memory/4296-135-0x0000000006C40000-0x00000000071E4000-memory.dmp
      Filesize

      5.6MB

    • memory/4296-134-0x0000000005630000-0x0000000005640000-memory.dmp
      Filesize

      64KB