Analysis
-
max time kernel
128s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
NewDocument002.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
NewDocument002.pdf.exe
-
Size
668.1MB
-
MD5
d889fc82620f1cb402b8de785364e6a3
-
SHA1
f459f585dbffe403086eaeeb68ee78cf26eeee08
-
SHA256
f8a9e3b0e40f55e363161472b1ae42f699f14d8251685270be41a6f45d567ac6
-
SHA512
b1b19a1cc7f893244b5f8d67b5d8e0ede984de7d7ced46c630236373e32193805cb65bd583ec3bf361354a79c291316f1aca68c30d0d9f92a3fc95911b7f3c69
-
SSDEEP
1536:Prae78zjORCDGwfdCSog01313is5g8HiQWoOA:lahKyd2n31b5zHCoOA
Malware Config
Extracted
purecrypter
https://andit.co/pharma/app/icon/pharma/SeemOffice_Jsbzsevl.png
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Executes dropped EXE 1 IoCs
Processes:
looptoolov.exepid process 5024 looptoolov.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NewDocument002.pdf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NewDocument002.pdf.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
looptoolov.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language looptoolov.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
looptoolov.exedescription pid process Token: SeDebugPrivilege 5024 looptoolov.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
NewDocument002.pdf.exedescription pid process target process PID 4848 wrote to memory of 5024 4848 NewDocument002.pdf.exe looptoolov.exe PID 4848 wrote to memory of 5024 4848 NewDocument002.pdf.exe looptoolov.exe PID 4848 wrote to memory of 5024 4848 NewDocument002.pdf.exe looptoolov.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NewDocument002.pdf.exe"C:\Users\Admin\AppData\Local\Temp\NewDocument002.pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\looptoolov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\looptoolov.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5024
-