Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 18:30

General

  • Target

    d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe

  • Size

    12KB

  • MD5

    78ad064f80c6559dd04e8536c06a1569

  • SHA1

    1ac17a7aff1efd81bab6909056b3ca1ea21a56eb

  • SHA256

    d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4

  • SHA512

    c9d37f911b3ededd2cfbafa56b7061d355ed931ab8480dc34b7fe693f03254008f0dde4bd5aadf14a0486ee97a60bb49eb89b5af8653b446c511dd2dc10c8711

  • SSDEEP

    192:nxffiqOh2yC17+XLgVLg8LgTLgyYB8WTzSwuf:nxffF5y67iLoLxLQLz8Lu

Malware Config

Extracted

Family

purecrypter

C2

https://transfer.sh/get/dtzeXI/Zalsbg.bmp

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe
    "C:\Users\Admin\AppData\Local\Temp\d9139bcd0b6b44e2f3d766d1d56377a756a0880730f7aeb03e29c964116933a4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1744-0-0x0000000000150000-0x0000000000158000-memory.dmp

    Filesize

    32KB

  • memory/1744-1-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1744-2-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/1744-3-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1744-4-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB