Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 18:30
Behavioral task
behavioral1
Sample
d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe
Resource
win10v2004-20240412-en
General
-
Target
d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe
-
Size
12KB
-
MD5
78ad064f80c6559dd04e8536c06a1569
-
SHA1
1ac17a7aff1efd81bab6909056b3ca1ea21a56eb
-
SHA256
d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4
-
SHA512
c9d37f911b3ededd2cfbafa56b7061d355ed931ab8480dc34b7fe693f03254008f0dde4bd5aadf14a0486ee97a60bb49eb89b5af8653b446c511dd2dc10c8711
-
SSDEEP
192:nxffiqOh2yC17+XLgVLg8LgTLgyYB8WTzSwuf:nxffF5y67iLoLxLQLz8Lu
Malware Config
Extracted
purecrypter
https://transfer.sh/get/dtzeXI/Zalsbg.bmp
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exedescription pid Process Token: SeDebugPrivilege 1744 d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe