Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 08:30

General

  • Target

    new order.exe

  • Size

    6KB

  • MD5

    805f8568083e83c0955f88e76d662d09

  • SHA1

    2b9fb2c42f4b2ca7210c7aadb1363a475355642b

  • SHA256

    713d9f0f4cda96491b1d757e354b08756fc2f67f2cc039b38566c9bb48f23f16

  • SHA512

    10ea6e19f5f93a11c720c9d3f88115402454d6bd01ade0a789d532e5a9e80c9eb9bf47ea1d830661b79c6fc168cabb670677ba18321fe3b6fa94c5d727a116f0

  • SSDEEP

    96:pntK+KmXi5aB+tFLbd58xd2nKFRa08rQzNt:hnby5q+tVd58AmZIy

Malware Config

Extracted

Family

purecrypter

C2

http://155.94.210.73/ido.mp3

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\new order.exe
    "C:\Users\Admin\AppData\Local\Temp\new order.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\new order.exe
      "C:\Users\Admin\AppData\Local\Temp\new order.exe"
      2⤵
        PID:768
      • C:\Users\Admin\AppData\Local\Temp\new order.exe
        "C:\Users\Admin\AppData\Local\Temp\new order.exe"
        2⤵
          PID:2116
        • C:\Users\Admin\AppData\Local\Temp\new order.exe
          "C:\Users\Admin\AppData\Local\Temp\new order.exe"
          2⤵
            PID:1784
          • C:\Users\Admin\AppData\Local\Temp\new order.exe
            "C:\Users\Admin\AppData\Local\Temp\new order.exe"
            2⤵
              PID:2156
            • C:\Users\Admin\AppData\Local\Temp\new order.exe
              "C:\Users\Admin\AppData\Local\Temp\new order.exe"
              2⤵
                PID:268
              • C:\Users\Admin\AppData\Local\Temp\new order.exe
                "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                2⤵
                  PID:2960
                • C:\Users\Admin\AppData\Local\Temp\new order.exe
                  "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                  2⤵
                    PID:2916
                  • C:\Users\Admin\AppData\Local\Temp\new order.exe
                    "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                    2⤵
                      PID:276
                    • C:\Users\Admin\AppData\Local\Temp\new order.exe
                      "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                      2⤵
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • outlook_office_path
                      • outlook_win_path
                      PID:2008

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Kfakqt.tmpdb

                    Filesize

                    148KB

                    MD5

                    90a1d4b55edf36fa8b4cc6974ed7d4c4

                    SHA1

                    aba1b8d0e05421e7df5982899f626211c3c4b5c1

                    SHA256

                    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                    SHA512

                    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                  • memory/2008-4912-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2008-4913-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2008-4915-0x000000001B1A0000-0x000000001B2B6000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2008-7214-0x0000000000460000-0x0000000000468000-memory.dmp

                    Filesize

                    32KB

                  • memory/2008-7215-0x0000000002050000-0x00000000020EE000-memory.dmp

                    Filesize

                    632KB

                  • memory/2008-7251-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2008-7250-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2008-7249-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2008-7217-0x00000000022A0000-0x000000000231A000-memory.dmp

                    Filesize

                    488KB

                  • memory/2008-7216-0x0000000000580000-0x00000000005AC000-memory.dmp

                    Filesize

                    176KB

                  • memory/2872-59-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-43-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-31-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-29-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-28-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-25-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-23-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-21-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-17-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-15-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-9-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-7-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-5-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-51-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-56-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-13-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-57-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-53-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-49-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-47-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-45-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-19-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-41-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-39-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-37-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-35-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-33-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-61-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-67-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-65-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-63-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-4890-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2872-11-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-4-0x000000001C4E0000-0x000000001C7CF000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2872-3-0x000000001C4E0000-0x000000001C7D6000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/2872-2-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2872-1-0x0000000000040000-0x0000000000048000-memory.dmp

                    Filesize

                    32KB

                  • memory/2872-0-0x000007FEF4E43000-0x000007FEF4E44000-memory.dmp

                    Filesize

                    4KB

                  • memory/2872-4892-0x0000000000670000-0x00000000006BC000-memory.dmp

                    Filesize

                    304KB

                  • memory/2872-4891-0x000000001C030000-0x000000001C160000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2872-4893-0x00000000020C0000-0x0000000002114000-memory.dmp

                    Filesize

                    336KB

                  • memory/2872-4914-0x000007FEF4E40000-0x000007FEF582C000-memory.dmp

                    Filesize

                    9.9MB