Analysis
-
max time kernel
92s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
NewDocument002.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
NewDocument002.pdf.exe
-
Size
668.1MB
-
MD5
d889fc82620f1cb402b8de785364e6a3
-
SHA1
f459f585dbffe403086eaeeb68ee78cf26eeee08
-
SHA256
f8a9e3b0e40f55e363161472b1ae42f699f14d8251685270be41a6f45d567ac6
-
SHA512
b1b19a1cc7f893244b5f8d67b5d8e0ede984de7d7ced46c630236373e32193805cb65bd583ec3bf361354a79c291316f1aca68c30d0d9f92a3fc95911b7f3c69
-
SSDEEP
1536:Prae78zjORCDGwfdCSog01313is5g8HiQWoOA:lahKyd2n31b5zHCoOA
Malware Config
Extracted
purecrypter
https://andit.co/pharma/app/icon/pharma/SeemOffice_Jsbzsevl.png
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Executes dropped EXE 1 IoCs
pid Process 4016 looptoolov.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NewDocument002.pdf.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language looptoolov.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4016 looptoolov.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 696 wrote to memory of 4016 696 NewDocument002.pdf.exe 90 PID 696 wrote to memory of 4016 696 NewDocument002.pdf.exe 90 PID 696 wrote to memory of 4016 696 NewDocument002.pdf.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NewDocument002.pdf.exe"C:\Users\Admin\AppData\Local\Temp\NewDocument002.pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\looptoolov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\looptoolov.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4016
-