Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 18:20
Behavioral task
behavioral1
Sample
5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2.exe
Resource
win10v2004-20240412-en
General
-
Target
5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2.exe
-
Size
13KB
-
MD5
a1a52e047f098572bc4f1020cbe19970
-
SHA1
f3b05c953cc2d459985e47f41609620cb4c59437
-
SHA256
5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2
-
SHA512
3a5914dc3655b53dcb36fbaf18ad170029c15933e4a9c0808a3c95179da6bff246a10dcf5cc048392dff988dc2ba3bde6f89f3a1ab9914b8c3535a95c8f70699
-
SSDEEP
192:6ZYUc8f/ftGgkpErlc/vl20JFi1TTgJMRqIcuuufNva:6ZddGgkpSWxuTEKRdN
Malware Config
Extracted
purecrypter
https://a.pomf.cat/rfeokw.bmp
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2.exedescription pid process Token: SeDebugPrivilege 1380 5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1380-0-0x00000000007D0000-0x00000000007D8000-memory.dmpFilesize
32KB
-
memory/1380-1-0x0000000074C30000-0x00000000753E0000-memory.dmpFilesize
7.7MB
-
memory/1380-2-0x00000000056D0000-0x0000000005C74000-memory.dmpFilesize
5.6MB
-
memory/1380-3-0x0000000005280000-0x0000000005312000-memory.dmpFilesize
584KB
-
memory/1380-4-0x0000000002AB0000-0x0000000002AC0000-memory.dmpFilesize
64KB
-
memory/1380-5-0x0000000005250000-0x000000000525A000-memory.dmpFilesize
40KB
-
memory/1380-6-0x0000000074C30000-0x00000000753E0000-memory.dmpFilesize
7.7MB
-
memory/1380-7-0x0000000002AB0000-0x0000000002AC0000-memory.dmpFilesize
64KB