Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 15:01
Behavioral task
behavioral1
Sample
2870a473e49673e2f6feb3d6e0792de6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2870a473e49673e2f6feb3d6e0792de6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
5b198d1272b07fa5c8880604f17a4d65.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
5b198d1272b07fa5c8880604f17a4d65.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7d41dd6194db2b9b1514ad154451bb7a.exe
Resource
win10v2004-20241007-en
General
-
Target
7d41dd6194db2b9b1514ad154451bb7a.exe
-
Size
383KB
-
MD5
7d41dd6194db2b9b1514ad154451bb7a
-
SHA1
3c2597920f384ee5152754e410594c078bc14fe5
-
SHA256
a5d3a4578fd5979a7e3fe324b7c329e5b853c1c739e73428d77ade897c113e44
-
SHA512
f32284fb34ac82dab3f88c110b51c3ffbf8b6705a96cc472c05dfe083a25ccd9ea3695590d577236f40f5f55778712a4f74251a05056249c31cfe8a7f3182019
-
SSDEEP
768:kSvNWMz7EVXU/hVJ+7hSYfGJsQO849wk9ESnGCuqqyUq60atL+Qs1eIeRgiSlmmu:VI47GyTGCwiSnmQUt0LB1eIus5gDB
Malware Config
Extracted
purecrypter
https://megalinkbj.com.br/images/img/css/www/soul/EitherInstitution_1_Cpoenwyi.jpg
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Executes dropped EXE 1 IoCs
Processes:
SETUP_~1.EXEpid Process 1628 SETUP_~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7d41dd6194db2b9b1514ad154451bb7a.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d41dd6194db2b9b1514ad154451bb7a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3520 1628 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SETUP_~1.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUP_~1.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SETUP_~1.EXEdescription pid Process Token: SeDebugPrivilege 1628 SETUP_~1.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7d41dd6194db2b9b1514ad154451bb7a.exedescription pid Process procid_target PID 5044 wrote to memory of 1628 5044 7d41dd6194db2b9b1514ad154451bb7a.exe 86 PID 5044 wrote to memory of 1628 5044 7d41dd6194db2b9b1514ad154451bb7a.exe 86 PID 5044 wrote to memory of 1628 5044 7d41dd6194db2b9b1514ad154451bb7a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d41dd6194db2b9b1514ad154451bb7a.exe"C:\Users\Admin\AppData\Local\Temp\7d41dd6194db2b9b1514ad154451bb7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 16763⤵
- Program crash
PID:3520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1628 -ip 16281⤵PID:3944