Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 16:55
Behavioral task
behavioral1
Sample
BOUNTY_FREE.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BOUNTY_FREE.exe
Resource
win10v2004-20241007-en
General
-
Target
BOUNTY_FREE.exe
-
Size
4.3MB
-
MD5
8ac2d675aca9c0d6837fdaf06da9d441
-
SHA1
2843ab6f217fdd652ea3ca5869df94cc17a8bfd0
-
SHA256
1db6a3913e7a0d08dde8cad8c1af9db94334b96020fc0ec035d9c77fa61e875e
-
SHA512
7b2247aa0dee3c51f165f5bffd11c00551921323c6ff09bc46b54ff3e7957c2c54c6517c914bdde4e3b8a7dbeb68d05abbd4a8400955fc0af0cdae53c9b69562
-
SSDEEP
98304:aqBdvTCa5zayzLu36rQAHGtx+zmBM1vXqtViWaz2eXjb/z2:tTJDaqrQAmtx+mu1vXqtViWDWa
Malware Config
Extracted
purecrypter
https://cdn.discordapp.com/attachments/1014517792986378343/1022788605682397214/moddedvgc_Dxtgnmlu.bmp
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BOUNTY_FREE.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" BOUNTY_FREE.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BOUNTY_FREE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BOUNTY_FREE.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 vanguardemulate.exe -
Loads dropped DLL 1 IoCs
pid Process 2840 cmd.exe -
resource yara_rule behavioral1/memory/2932-0-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-4-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-7-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-8-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-6-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-5-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-3-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-2-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-19-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-20-0x000000013F9E0000-0x0000000140556000-memory.dmp themida behavioral1/memory/2932-33-0x000000013F9E0000-0x0000000140556000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BOUNTY_FREE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2932 BOUNTY_FREE.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\apppatch\Custom\vanguardemulate.exe BOUNTY_FREE.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe 2932 BOUNTY_FREE.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2932 BOUNTY_FREE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 2932 BOUNTY_FREE.exe Token: SeDebugPrivilege 3068 vanguardemulate.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2844 2932 BOUNTY_FREE.exe 31 PID 2932 wrote to memory of 2844 2932 BOUNTY_FREE.exe 31 PID 2932 wrote to memory of 2844 2932 BOUNTY_FREE.exe 31 PID 2932 wrote to memory of 2888 2932 BOUNTY_FREE.exe 32 PID 2932 wrote to memory of 2888 2932 BOUNTY_FREE.exe 32 PID 2932 wrote to memory of 2888 2932 BOUNTY_FREE.exe 32 PID 2932 wrote to memory of 2840 2932 BOUNTY_FREE.exe 33 PID 2932 wrote to memory of 2840 2932 BOUNTY_FREE.exe 33 PID 2932 wrote to memory of 2840 2932 BOUNTY_FREE.exe 33 PID 2840 wrote to memory of 3068 2840 cmd.exe 34 PID 2840 wrote to memory of 3068 2840 cmd.exe 34 PID 2840 wrote to memory of 3068 2840 cmd.exe 34 PID 2932 wrote to memory of 2268 2932 BOUNTY_FREE.exe 35 PID 2932 wrote to memory of 2268 2932 BOUNTY_FREE.exe 35 PID 2932 wrote to memory of 2268 2932 BOUNTY_FREE.exe 35 PID 2932 wrote to memory of 2860 2932 BOUNTY_FREE.exe 36 PID 2932 wrote to memory of 2860 2932 BOUNTY_FREE.exe 36 PID 2932 wrote to memory of 2860 2932 BOUNTY_FREE.exe 36 PID 2932 wrote to memory of 2900 2932 BOUNTY_FREE.exe 37 PID 2932 wrote to memory of 2900 2932 BOUNTY_FREE.exe 37 PID 2932 wrote to memory of 2900 2932 BOUNTY_FREE.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\BOUNTY_FREE.exe"C:\Users\Admin\AppData\Local\Temp\BOUNTY_FREE.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color c2⤵PID:2844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\apppatch\Custom\vanguardemulate.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\apppatch\Custom\vanguardemulate.exeC:\Windows\apppatch\Custom\vanguardemulate.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5050a7af7e10f1be4ea4a9368593b88b5
SHA10774104a103df350bfd22ec5beac033fa4d00f50
SHA256ed44b6f905f3764e43881c26610396ee029e3129ca9f8ee882937ba4286a7851
SHA5125153543a0ecb1f18e6959a76c5dc22c4f85249c4142488a206f4f56afd6b4848588a79aee2b85a7911768bd1b322de7996e1f93283eacfe8ae4e493ae25881a0