| File name: | Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7 |
| Full analysis: | https://app.any.run/tasks/e28babe5-1d94-4e07-a368-1c85e76aa739 |
| Verdict: | Malicious activity |
| Threats: | First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system. |
| Analysis date: | May 15, 2025, 13:29:55 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 847DD6F02FC94D176D9F5F863086E502 |
| SHA1: | CC33197029E4AC79653340A810CCAC328DEABBC7 |
| SHA256: | 378D021F2C7DDBB8BA3C90FDFB6DA9D89727FB791542585C0E22C4DB6484F4F7 |
| SSDEEP: | 6144:NzlfqG1PZksuQrOMrBdLLKHBQtCbQ5VC9CbDwpVAOTl1jsXVLJeUMOJc:NzlfqG1Pa4dLKHeCbQrpkBTliXVLc1g |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (55.8) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21) |
| .scr | | | Windows screen saver (9.9) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2040:10:19 19:06:47+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 508928 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x7e35e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | csrss |
| FileVersion: | 1.0.0.0 |
| InternalName: | Steal1WC.exe |
| LegalCopyright: | Copyright © 1907 |
| LegalTrademarks: | - |
| OriginalFileName: | Steal1WC.exe |
| ProductName: | csrss |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1628 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7244 | "C:\Users\admin\Desktop\Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe" | C:\Users\admin\Desktop\Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: csrss Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 7480 | C:\WINDOWS\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} | C:\Windows\System32\dllhost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7540 | "C:\Users\admin\Desktop\Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe" | C:\Users\admin\Desktop\Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | dllhost.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: csrss Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 7880 | "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\admin\Desktop\Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe" | C:\Windows\System32\cmd.exe | — | Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7888 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7936 | choice /C Y /N /D Y /T 3 | C:\Windows\System32\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\AEifLxnwDXsUQZf |
| Operation: | write | Name: | AEifLxnwDXsUQZf |
Value: AEifLxnwDXsUQZf | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7540) Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.48.23.193:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7540 | Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
8184 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2112 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 23.48.23.193:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
7540 | Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
ip-api.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
7540 | Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
7540 | Sigmanly_378d021f2c7ddbb8ba3c90fdfb6da9d89727fb791542585c0e22c4db6484f4f7.exe | A Network Trojan was detected | ET MALWARE PureLogs GZIP Exfiltration Outbound |