Analysis
-
max time kernel
29s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 01:20
Behavioral task
behavioral1
Sample
584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe
Resource
win10v2004-20240426-en
General
-
Target
584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe
-
Size
7KB
-
MD5
e0354350b177887076f4c89567e0af8d
-
SHA1
999fc3514c83f5b3bfaf899b656a194f7f60ed05
-
SHA256
584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032
-
SHA512
5972d529569ad3aecd8a02de1b2150a3901e2fe09aa5223956d4fd9f77ec9acd308d938c5748b8e38b6090484d0ec6f288f2295f67a6fcc12b0dc770620600fd
-
SSDEEP
96:nGJKj1y2oPbML8RcyuHazDvDId4IBmc+TMsa+aIVzNt:G4jU2o48RVHA4U0Zv
Malware Config
Extracted
purecrypter
https://www1.militarydefensenow.com/Stay/Vdopcuygit.vdf
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exedescription pid process Token: SeDebugPrivilege 4856 584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe"C:\Users\Admin\AppData\Local\Temp\584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe"C:\Users\Admin\AppData\Local\Temp\584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe"2⤵PID:2488
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe.log
Filesize1KB
MD5f3eb81974dc5933681e933f07209ff5f
SHA17af8cae0f1d03e82daaf784df9886705685baac7
SHA256e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2
SHA512d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
152KB
MD573bd1e15afb04648c24593e8ba13e983
SHA14dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA5126eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7