Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 08:23
Behavioral task
behavioral1
Sample
2870a473e49673e2f6feb3d6e0792de6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2870a473e49673e2f6feb3d6e0792de6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
5b198d1272b07fa5c8880604f17a4d65.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
5b198d1272b07fa5c8880604f17a4d65.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7d41dd6194db2b9b1514ad154451bb7a.exe
Resource
win10v2004-20241007-en
General
-
Target
7d41dd6194db2b9b1514ad154451bb7a.exe
-
Size
383KB
-
MD5
7d41dd6194db2b9b1514ad154451bb7a
-
SHA1
3c2597920f384ee5152754e410594c078bc14fe5
-
SHA256
a5d3a4578fd5979a7e3fe324b7c329e5b853c1c739e73428d77ade897c113e44
-
SHA512
f32284fb34ac82dab3f88c110b51c3ffbf8b6705a96cc472c05dfe083a25ccd9ea3695590d577236f40f5f55778712a4f74251a05056249c31cfe8a7f3182019
-
SSDEEP
768:kSvNWMz7EVXU/hVJ+7hSYfGJsQO849wk9ESnGCuqqyUq60atL+Qs1eIeRgiSlmmu:VI47GyTGCwiSnmQUt0LB1eIus5gDB
Malware Config
Extracted
purecrypter
https://megalinkbj.com.br/images/img/css/www/soul/EitherInstitution_1_Cpoenwyi.jpg
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Executes dropped EXE 1 IoCs
pid Process 656 SETUP_~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d41dd6194db2b9b1514ad154451bb7a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3488 656 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUP_~1.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 656 SETUP_~1.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 388 wrote to memory of 656 388 7d41dd6194db2b9b1514ad154451bb7a.exe 88 PID 388 wrote to memory of 656 388 7d41dd6194db2b9b1514ad154451bb7a.exe 88 PID 388 wrote to memory of 656 388 7d41dd6194db2b9b1514ad154451bb7a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d41dd6194db2b9b1514ad154451bb7a.exe"C:\Users\Admin\AppData\Local\Temp\7d41dd6194db2b9b1514ad154451bb7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 16763⤵
- Program crash
PID:3488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 656 -ip 6561⤵PID:1696