Analysis
-
max time kernel
89s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
NewDocument002.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
NewDocument002.pdf.exe
-
Size
668.1MB
-
MD5
d889fc82620f1cb402b8de785364e6a3
-
SHA1
f459f585dbffe403086eaeeb68ee78cf26eeee08
-
SHA256
f8a9e3b0e40f55e363161472b1ae42f699f14d8251685270be41a6f45d567ac6
-
SHA512
b1b19a1cc7f893244b5f8d67b5d8e0ede984de7d7ced46c630236373e32193805cb65bd583ec3bf361354a79c291316f1aca68c30d0d9f92a3fc95911b7f3c69
-
SSDEEP
1536:Prae78zjORCDGwfdCSog01313is5g8HiQWoOA:lahKyd2n31b5zHCoOA
Malware Config
Extracted
purecrypter
https://andit.co/pharma/app/icon/pharma/SeemOffice_Jsbzsevl.png
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Executes dropped EXE 1 IoCs
Processes:
looptoolov.exepid process 1040 looptoolov.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NewDocument002.pdf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NewDocument002.pdf.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
looptoolov.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language looptoolov.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
looptoolov.exedescription pid process Token: SeDebugPrivilege 1040 looptoolov.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
NewDocument002.pdf.exedescription pid process target process PID 3744 wrote to memory of 1040 3744 NewDocument002.pdf.exe looptoolov.exe PID 3744 wrote to memory of 1040 3744 NewDocument002.pdf.exe looptoolov.exe PID 3744 wrote to memory of 1040 3744 NewDocument002.pdf.exe looptoolov.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NewDocument002.pdf.exe"C:\Users\Admin\AppData\Local\Temp\NewDocument002.pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\looptoolov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\looptoolov.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1040
-