Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2023 07:06

General

  • Target

    39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe

  • Size

    14KB

  • MD5

    87855d601e472d9d37e772e53029dacf

  • SHA1

    dd320d1aab72cf9c3f3f7fb08a71aeab98309fd4

  • SHA256

    39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62

  • SHA512

    c396621f95faaae4fb94f309b498f1f52620bf912ca5e2cd75dfd3ec2f796ebae31f44ebb749691f9cbaf26ad7546200697c534bdd1d530cd22bb504ff733c93

  • SSDEEP

    192:Cebp4jyqq7b2GG0/j4XlOgTQe4tt9nSidoo79ED607Ib:CebayqO2GGxXlDTQe49SCMI

Malware Config

Extracted

Family

purecrypter

C2

https://suad.group/Lypqx.mp3

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe
    "C:\Users\Admin\AppData\Local\Temp\39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe
      C:\Users\Admin\AppData\Local\Temp\39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe
      2⤵
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:644
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62' -Value '"C:\Users\Admin\AppData\Local\Temp\39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe"' -PropertyType 'String'
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\39b10e16dcda487ccf77695191c4c5e45d7e3b1ca85099f4bd934f260dc7ef62.exe.log

    Filesize

    1KB

    MD5

    159a40ccfd419bd60a20a1c278edaafd

    SHA1

    09bc35e46135b6b44c609fe6514ab7e2c8696a99

    SHA256

    24487f4b6318683dcd81970e9f57fb45167575f687f7831a563176e20da657b6

    SHA512

    b5c5b8c23479afff6b72c37c2cc1204c079ae003bae586d082d2b05acfdab8753fea78c5e53f692e4a45aba6746703d9ca99a2d0fa7bd88a7f35a910d1ad1ff3

  • C:\Users\Admin\AppData\Local\Temp\Costura\1485B29524EF63EB83DF771D39CCA767\64\sqlite.interop.dll

    Filesize

    1.7MB

    MD5

    02f50a23e31d1f21aa21ae52faf3c05a

    SHA1

    5b21234729dedfa1b456138872ef2a046b9ee86f

    SHA256

    5f0e72e1839db4aa41f560e0a68c7a95c9e1656bc2f4f4ff64803655d02e5272

    SHA512

    bc2fcca125506d9b762df4e9df24a907b9e554d857e705945ae252e7e6b50dada043ef0e69828b780ac9b569053fcf912c27a770469a80f1f6094c146afdb9b0

  • C:\Users\Admin\AppData\Local\Temp\Mkhtxaxylz.tmp

    Filesize

    124KB

    MD5

    9618e15b04a4ddb39ed6c496575f6f95

    SHA1

    1c28f8750e5555776b3c80b187c5d15a443a7412

    SHA256

    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

    SHA512

    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

  • C:\Users\Admin\AppData\Local\Temp\Qvmczb.tmp

    Filesize

    148KB

    MD5

    90a1d4b55edf36fa8b4cc6974ed7d4c4

    SHA1

    aba1b8d0e05421e7df5982899f626211c3c4b5c1

    SHA256

    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

    SHA512

    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hqj2l5ol.5yr.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/644-47-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-2218-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/644-57-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-9-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/644-61-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-59-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-2265-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/644-12-0x000001A69CB10000-0x000001A69CC18000-memory.dmp

    Filesize

    1.0MB

  • memory/644-13-0x000001A684340000-0x000001A684350000-memory.dmp

    Filesize

    64KB

  • memory/644-16-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-17-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-19-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-21-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-23-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-25-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-27-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-31-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-35-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-33-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-29-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-37-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-39-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-41-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-43-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-51-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-49-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-53-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-2224-0x000001A69DA10000-0x000001A69DA36000-memory.dmp

    Filesize

    152KB

  • memory/644-45-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-55-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-2223-0x000001A69DCD0000-0x000001A69DD0A000-memory.dmp

    Filesize

    232KB

  • memory/644-2220-0x000001A69D9A0000-0x000001A69DA0C000-memory.dmp

    Filesize

    432KB

  • memory/644-2219-0x000001A69D910000-0x000001A69D98A000-memory.dmp

    Filesize

    488KB

  • memory/644-65-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-67-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-63-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-69-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-71-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-73-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-75-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-77-0x000001A69CB10000-0x000001A69CC13000-memory.dmp

    Filesize

    1.0MB

  • memory/644-2210-0x000001A682C30000-0x000001A682C38000-memory.dmp

    Filesize

    32KB

  • memory/644-2211-0x000001A684350000-0x000001A6843EE000-memory.dmp

    Filesize

    632KB

  • memory/644-2212-0x000001A69D6D0000-0x000001A69D8E0000-memory.dmp

    Filesize

    2.1MB

  • memory/644-15-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/644-2217-0x000001A684340000-0x000001A684350000-memory.dmp

    Filesize

    64KB

  • memory/700-2-0x000001DD6AFA0000-0x000001DD6AFB0000-memory.dmp

    Filesize

    64KB

  • memory/700-5-0x000001DD6B450000-0x000001DD6B550000-memory.dmp

    Filesize

    1024KB

  • memory/700-3-0x000001DD6B0F0000-0x000001DD6B208000-memory.dmp

    Filesize

    1.1MB

  • memory/700-14-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/700-1-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/700-8-0x000001DD6AFA0000-0x000001DD6AFB0000-memory.dmp

    Filesize

    64KB

  • memory/700-6-0x000001DD6B550000-0x000001DD6B59C000-memory.dmp

    Filesize

    304KB

  • memory/700-4-0x000001DD6B210000-0x000001DD6B310000-memory.dmp

    Filesize

    1024KB

  • memory/700-0-0x000001DD68A00000-0x000001DD68A08000-memory.dmp

    Filesize

    32KB

  • memory/700-7-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/1876-2266-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB

  • memory/1876-2269-0x000001C26B530000-0x000001C26B540000-memory.dmp

    Filesize

    64KB

  • memory/1876-2267-0x000001C26B530000-0x000001C26B540000-memory.dmp

    Filesize

    64KB

  • memory/1876-2268-0x000001C26BA50000-0x000001C26BA72000-memory.dmp

    Filesize

    136KB

  • memory/1876-2279-0x000001C26B530000-0x000001C26B540000-memory.dmp

    Filesize

    64KB

  • memory/1876-2282-0x00007FFD23810000-0x00007FFD242D1000-memory.dmp

    Filesize

    10.8MB