Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2023 13:52
Behavioral task
behavioral1
Sample
INVOICE, & REMITTANCE INFORMATIO.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
INVOICE, & REMITTANCE INFORMATIO.exe
Resource
win10v2004-20230703-en
General
-
Target
INVOICE, & REMITTANCE INFORMATIO.exe
-
Size
108KB
-
MD5
61ce3c89c2578f45fccd23b556634adf
-
SHA1
fb4c545865c343e4fa1c3e289c68a432c5cbf307
-
SHA256
e6acd013f402294fb872251fc4ad72420d608afff59ba25d57efe2f812493096
-
SHA512
e16f72251be777f6230ae0da589970f0e24d783bf3a9243bf553720359ea96aed60c06b40f7e68622991652b469dbf2dbfd21a7f77aac1753e7afbe229a6681c
-
SSDEEP
3072:5Pyx4EtMJ+aoHibA4UbOB2P06J/RtfwXALweSaIKg/u3:5Ho8vUa2PjWXAsevg
Malware Config
Extracted
purecrypter
https://files.catbox.moe/gmiwb3.vdf
Extracted
formbook
4.1
c1e9
solvedturkeysecuritysbn.net
premiermanufacturinggroup.net
1mvirqw.sbs
5zaclc2.top
b71h.xyz
oldiescafe.shop
371qp.com
h2arc.com
kiwork.xyz
www007ts.info
cgnant.info
m5arun.cfd
askme.click
fd5gsym.sbs
m940o1.cfd
gaurangnaik.xyz
loveoftheriver.farm
nk1966.cfd
lazuritebluediamond.biz
lir337.cfd
777fewhs.cfd
hoss88.com
oj56hds0a5.cfd
2h4bxm.tokyo
r69wxev.sbs
kooxx.online
nqj22z.cfd
alikor.work
gcomut.online
6k5.lat
tuconjunto.store
taknpv.sbs
agrivoltics.info
omyoga.info
primotzy.info
prhoffman.tech
el4o4y.cfd
1479foursixesranch.info
ngr.lat
knuvope8032pnfwto.pro
lgqxu5.cfd
elnwxm.top
ep6qsshyaq.cfd
ctoxin.net
somaderm.top
lqlcdcl.top
theinkless.net
afriquelegal.com
7y6yq.xyz
dryerventcleaning.biz
o3e3de.cfd
hgbvd.online
suitsfactory.net
cordex.info
lythjh4ufj.cfd
3ap742tm.shop
projectdopamine.xyz
joytrip.net
l680rr.cfd
divvyfy.com
zzwkypokkt.cfd
erinyeler.online
organicscale.cloud
o1amm8.cfd
qointechbback.xyz
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4940-1221-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4940-1226-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4660-1232-0x0000000000CA0000-0x0000000000CCF000-memory.dmp formbook behavioral2/memory/4660-1237-0x0000000000CA0000-0x0000000000CCF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2928 set thread context of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 4940 set thread context of 3240 4940 INVOICE, & REMITTANCE INFORMATIO.exe 62 PID 4660 set thread context of 3240 4660 cmstp.exe 62 -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe 4660 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3240 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4940 INVOICE, & REMITTANCE INFORMATIO.exe 4660 cmstp.exe 4660 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2928 INVOICE, & REMITTANCE INFORMATIO.exe Token: SeDebugPrivilege 4940 INVOICE, & REMITTANCE INFORMATIO.exe Token: SeDebugPrivilege 4660 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2928 wrote to memory of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 2928 wrote to memory of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 2928 wrote to memory of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 2928 wrote to memory of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 2928 wrote to memory of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 2928 wrote to memory of 4940 2928 INVOICE, & REMITTANCE INFORMATIO.exe 90 PID 3240 wrote to memory of 4660 3240 Explorer.EXE 91 PID 3240 wrote to memory of 4660 3240 Explorer.EXE 91 PID 3240 wrote to memory of 4660 3240 Explorer.EXE 91 PID 4660 wrote to memory of 5072 4660 cmstp.exe 92 PID 4660 wrote to memory of 5072 4660 cmstp.exe 92 PID 4660 wrote to memory of 5072 4660 cmstp.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\INVOICE, & REMITTANCE INFORMATIO.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE, & REMITTANCE INFORMATIO.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\INVOICE, & REMITTANCE INFORMATIO.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE, & REMITTANCE INFORMATIO.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVOICE, & REMITTANCE INFORMATIO.exe"3⤵PID:5072
-
-