Analysis

  • max time kernel
    94s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 08:30

General

  • Target

    new order.exe

  • Size

    6KB

  • MD5

    805f8568083e83c0955f88e76d662d09

  • SHA1

    2b9fb2c42f4b2ca7210c7aadb1363a475355642b

  • SHA256

    713d9f0f4cda96491b1d757e354b08756fc2f67f2cc039b38566c9bb48f23f16

  • SHA512

    10ea6e19f5f93a11c720c9d3f88115402454d6bd01ade0a789d532e5a9e80c9eb9bf47ea1d830661b79c6fc168cabb670677ba18321fe3b6fa94c5d727a116f0

  • SSDEEP

    96:pntK+KmXi5aB+tFLbd58xd2nKFRa08rQzNt:hnby5q+tVd58AmZIy

Malware Config

Extracted

Family

purecrypter

C2

http://155.94.210.73/ido.mp3

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\new order.exe
    "C:\Users\Admin\AppData\Local\Temp\new order.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\new order.exe
      "C:\Users\Admin\AppData\Local\Temp\new order.exe"
      2⤵
        PID:4400
      • C:\Users\Admin\AppData\Local\Temp\new order.exe
        "C:\Users\Admin\AppData\Local\Temp\new order.exe"
        2⤵
          PID:2444
        • C:\Users\Admin\AppData\Local\Temp\new order.exe
          "C:\Users\Admin\AppData\Local\Temp\new order.exe"
          2⤵
            PID:1924
          • C:\Users\Admin\AppData\Local\Temp\new order.exe
            "C:\Users\Admin\AppData\Local\Temp\new order.exe"
            2⤵
              PID:664
            • C:\Users\Admin\AppData\Local\Temp\new order.exe
              "C:\Users\Admin\AppData\Local\Temp\new order.exe"
              2⤵
                PID:4116
              • C:\Users\Admin\AppData\Local\Temp\new order.exe
                "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                2⤵
                  PID:5052
                • C:\Users\Admin\AppData\Local\Temp\new order.exe
                  "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                  2⤵
                    PID:2132
                  • C:\Users\Admin\AppData\Local\Temp\new order.exe
                    "C:\Users\Admin\AppData\Local\Temp\new order.exe"
                    2⤵
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • outlook_office_path
                    • outlook_win_path
                    PID:1972

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\new order.exe.log

                  Filesize

                  1KB

                  MD5

                  02bda42daaa36d550e37d0e7d7b9b321

                  SHA1

                  5cccf64dd1514a92f128cd1e21d7fbf3e50e9672

                  SHA256

                  333fe7dc3fd52d35cd054deeba517a51775978b4360817c8a92a632093a00570

                  SHA512

                  313a20e360b47461b913f902517442eb0f41a43155c730ddf19454e80951dfaebe7f23637af5a51045125b2ff1d7682ccc75c03773cd330c8864a7de6f2f3169

                • C:\Users\Admin\AppData\Local\Temp\Lnjdliw.tmpdb

                  Filesize

                  124KB

                  MD5

                  9618e15b04a4ddb39ed6c496575f6f95

                  SHA1

                  1c28f8750e5555776b3c80b187c5d15a443a7412

                  SHA256

                  a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                  SHA512

                  f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                • C:\Users\Admin\AppData\Local\Temp\Xqlmybplul.tmpdb

                  Filesize

                  152KB

                  MD5

                  73bd1e15afb04648c24593e8ba13e983

                  SHA1

                  4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91

                  SHA256

                  aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b

                  SHA512

                  6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

                • memory/1972-4900-0x00007FFC66ED0000-0x00007FFC67991000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1972-4901-0x00007FFC66ED0000-0x00007FFC67991000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1972-4902-0x000001C176E30000-0x000001C176F46000-memory.dmp

                  Filesize

                  1.1MB

                • memory/1972-7202-0x000001C15E5F0000-0x000001C15E5F8000-memory.dmp

                  Filesize

                  32KB

                • memory/1972-7260-0x00007FFC66ED0000-0x00007FFC67991000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1972-7205-0x000001C177590000-0x000001C17760A000-memory.dmp

                  Filesize

                  488KB

                • memory/1972-7204-0x000001C15E610000-0x000001C15E63C000-memory.dmp

                  Filesize

                  176KB

                • memory/1972-7203-0x000001C176D80000-0x000001C176E1E000-memory.dmp

                  Filesize

                  632KB

                • memory/3224-23-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-59-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-21-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-33-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-43-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-47-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-41-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-39-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-37-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-35-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-45-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-31-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-29-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-27-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-25-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-20-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-15-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-4-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-9-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-7-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-5-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-17-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-57-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-63-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-65-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-67-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-62-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-55-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-53-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-51-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-49-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-4890-0x00007FFC66ED0000-0x00007FFC67991000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3224-4891-0x000001E7F3360000-0x000001E7F3490000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3224-4892-0x000001E7D9580000-0x000001E7D95CC000-memory.dmp

                  Filesize

                  304KB

                • memory/3224-4893-0x000001E7F1E20000-0x000001E7F1E74000-memory.dmp

                  Filesize

                  336KB

                • memory/3224-11-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-13-0x000001E7F1FC0000-0x000001E7F22AF000-memory.dmp

                  Filesize

                  2.9MB

                • memory/3224-3-0x000001E7F1FC0000-0x000001E7F22B6000-memory.dmp

                  Filesize

                  3.0MB

                • memory/3224-2-0x00007FFC66ED0000-0x00007FFC67991000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3224-1-0x00007FFC66ED3000-0x00007FFC66ED5000-memory.dmp

                  Filesize

                  8KB

                • memory/3224-0-0x000001E7D7780000-0x000001E7D7788000-memory.dmp

                  Filesize

                  32KB

                • memory/3224-4903-0x00007FFC66ED0000-0x00007FFC67991000-memory.dmp

                  Filesize

                  10.8MB