Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 09:27

General

  • Target

    Ejpba.exe

  • Size

    6KB

  • MD5

    1c56623199e1959f271a191d603360bf

  • SHA1

    9a7429e8b08ef843739c7739e8a314006c20b2af

  • SHA256

    99fce21d1aa81f7f3b8fae707aabd43b5b51b9da0fbb7258b68bd5fe9d62073a

  • SHA512

    87c50fb8f13d5b0ce5d83d99e64a7728e466e33118faea4c52136dd8a2f70d5f4217c90f4cc3c415628b9f96b7ed114cedb2455e3edc1cc39e67a36b79fceee4

  • SSDEEP

    96:QhN/c/kk91xUL9678Ms0wFFpBV4Xh4yvn1j4r/8iT85fTc70zNt:QhN/cx1o96hwFH4R4viRM+

Malware Config

Extracted

Family

purecrypter

C2

http://103.195.103.33/nf/Qtdxulkcon.wav

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ejpba.exe
    "C:\Users\Admin\AppData\Local\Temp\Ejpba.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1760-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

    Filesize

    4KB

  • memory/1760-1-0x00000000009A0000-0x00000000009A8000-memory.dmp

    Filesize

    32KB

  • memory/1760-2-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1760-3-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

    Filesize

    4KB

  • memory/1760-4-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB