Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 04:41

General

  • Target

    1c56623199e1959f271a191d603360bf.exe

  • Size

    6KB

  • MD5

    1c56623199e1959f271a191d603360bf

  • SHA1

    9a7429e8b08ef843739c7739e8a314006c20b2af

  • SHA256

    99fce21d1aa81f7f3b8fae707aabd43b5b51b9da0fbb7258b68bd5fe9d62073a

  • SHA512

    87c50fb8f13d5b0ce5d83d99e64a7728e466e33118faea4c52136dd8a2f70d5f4217c90f4cc3c415628b9f96b7ed114cedb2455e3edc1cc39e67a36b79fceee4

  • SSDEEP

    96:QhN/c/kk91xUL9678Ms0wFFpBV4Xh4yvn1j4r/8iT85fTc70zNt:QhN/cx1o96hwFH4R4viRM+

Malware Config

Extracted

Family

purecrypter

C2

http://103.195.103.33/nf/Qtdxulkcon.wav

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c56623199e1959f271a191d603360bf.exe
    "C:\Users\Admin\AppData\Local\Temp\1c56623199e1959f271a191d603360bf.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-0-0x0000000074EAE000-0x0000000074EAF000-memory.dmp

    Filesize

    4KB

  • memory/1664-1-0x0000000000800000-0x0000000000808000-memory.dmp

    Filesize

    32KB

  • memory/1664-2-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB

  • memory/1664-3-0x0000000074EAE000-0x0000000074EAF000-memory.dmp

    Filesize

    4KB

  • memory/1664-4-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB