Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 01:11
Behavioral task
behavioral1
Sample
New Project Sets KV222LLV1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
New Project Sets KV222LLV1.exe
Resource
win10v2004-20240611-en
General
-
Target
New Project Sets KV222LLV1.exe
-
Size
7KB
-
MD5
4fb94a7ddd79bab8fc7ef9891f4f7e19
-
SHA1
840f8e0652e7ffa9d8650ba1ff62f0ddab00cef2
-
SHA256
3ae49a5b78ab66f58f2d5805940b0f73b46b942dc0ee12bb60bf6ec88425550a
-
SHA512
8fedd969465be1b6f87078276a37850a8d18a8ceebef9dd69f14702c4e392f30449456bab6f95a80df092c5c49f236df5b5cf013b02cc0d4280d4222920d93df
-
SSDEEP
96:TT3HQfHAWy0/lymtF6vBRl4gT9S40/g8yutGFEoOzNt:P34/4ekJB040/FyOGJI
Malware Config
Extracted
purecrypter
https://360.asesoriaenfarmacias.com/Jhacc.dat
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
New Project Sets KV222LLV1.exedescription pid process Token: SeDebugPrivilege 2500 New Project Sets KV222LLV1.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2500-0-0x0000000074ABE000-0x0000000074ABF000-memory.dmpFilesize
4KB
-
memory/2500-1-0x0000000000C70000-0x0000000000C78000-memory.dmpFilesize
32KB
-
memory/2500-2-0x0000000074AB0000-0x000000007519E000-memory.dmpFilesize
6.9MB
-
memory/2500-3-0x0000000074ABE000-0x0000000074ABF000-memory.dmpFilesize
4KB
-
memory/2500-4-0x0000000074AB0000-0x000000007519E000-memory.dmpFilesize
6.9MB