File name:

759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N

Full analysis: https://app.any.run/tasks/10367778-b00a-48a8-9375-913439e4bc22
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: September 23, 2024, 01:54:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
purecrypter
purelogs
netreactor
purehvnc
zgrat
exfiltration
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

0AA84714340FA1C39F8BBEEB80DF72C0

SHA1:

23DD1795EFC9FB0FDEECCB444FD0E38506BB937D

SHA256:

759971B82A183C44275CF9C6BA75C27D879644D979EEF9A19D1093D480804FC1

SSDEEP:

6144:EXoNZM8QHglJtOUHYYYYYYYYYYYYYYYYYYYYYYYzaILH:EXoNm8AglJtOb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
    • PUREHVNC has been detected (YARA)

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • [YARA] zgRAT detected by memory dumps

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • PURECRYPTER has been detected (SURICATA)

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Connects to the CnC server

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • PURELOGS has been detected (SURICATA)

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Stealers network behavior

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Malware-specific behavior: drops SQLite library (may be used to steal credentials)

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Connects to unusual port

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Contacting a server suspected of hosting an CnC

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
  • INFO

    • Reads the computer name

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Checks supported languages

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Disables trace logs

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
    • Manual execution by a user

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Creates files or folders in the user directory

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
    • Checks proxy server information

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
    • Reads the machine GUID from the registry

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 3952)
      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • .NET Reactor protector has been detected

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
    • Create files in a temporary directory

      • 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe (PID: 2624)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:19 06:29:46+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 133632
InitializedDataSize: 142848
UninitializedDataSize: -
EntryPoint: 0x228b2
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 156.1.0.11139
ProductVersionNumber: 156.1.0.11139
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Ubisoft Connect Installer
CompanyName: Ubisoft
FileDescription: Ubisoft Connect Installer
FileVersion: 156.1.0.11139
InternalName: Odhmnywaksa.exe
LegalCopyright: Ubisoft
LegalTrademarks: Ubisoft, Ubisoft Connect
OriginalFileName: Odhmnywaksa.exe
ProductName: Ubisoft Connect 156.1.11139 installer
ProductVersion: 156.1.0.11139
AssemblyVersion: 156.1.0.11139
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1n.exe THREAT 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1n.exe

Process information

PID
CMD
Path
Indicators
Parent process
2624"C:\Users\admin\Desktop\759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe"C:\Users\admin\Desktop\759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
explorer.exe
User:
admin
Company:
Ubisoft
Integrity Level:
MEDIUM
Description:
Ubisoft Connect Installer
Exit code:
0
Version:
156.1.0.11139
Modules
Images
c:\users\admin\desktop\759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1n.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3952"C:\Users\admin\Desktop\759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe" C:\Users\admin\Desktop\759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
explorer.exe
User:
admin
Company:
Ubisoft
Integrity Level:
MEDIUM
Description:
Ubisoft Connect Installer
Exit code:
4294967295
Version:
156.1.0.11139
Modules
Images
c:\users\admin\desktop\759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1n.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
2 472
Read events
2 458
Write events
14
Delete events
0

Modification events

(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3952) 759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
19
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Nathxj.tmp
MD5:
SHA256:
3952759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\UbisoftConnectInstaller.exeexecutable
MD5:0AA84714340FA1C39F8BBEEB80DF72C0
SHA256:759971B82A183C44275CF9C6BA75C27D879644D979EEF9A19D1093D480804FC1
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Costura\AF7011DB9BA75DE3E4434379E8037F31\32\sqlite.interop.dllexecutable
MD5:E962A1987DDF83D7050AD3752BB56CB6
SHA256:77B3EADBC24D7BAFDB5FFBEA389FAD9722DB7B563E849388510002CB759E2C00
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Mfqbhjsiq.tmpbinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Soqrybscl.tmpbinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Jybqfhfjwaj.tmpbinary
MD5:0B2213BCE3950F1E95FEEB8E8B3B9543
SHA256:71DB3D87713A320BA9FD3043392509B430630CFCF574EE84118406D6471CFC5A
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Dvnyw.tmpbinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Wxmmajsjn.tmpsqlite
MD5:95FFD778940E6DF4846B0B12C8DD5821
SHA256:21A2DEBD389DB456465DFEFFDB15F0AF3FBC46F007CBA67513A13EB10D14E94F
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Uycsyefxbwm.tmpbinary
MD5:0038776EBF9A0DBB1B684F8086FED757
SHA256:9CD06F52792D10BD70992DD6C9B617435725B3A5F03DE62050E8A52FAE2A709C
2624759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exeC:\Users\admin\AppData\Local\Temp\Pdkjmj.tmpbinary
MD5:29A644B1F0D96166A05602FE27B3F4AD
SHA256:BF96902FEB97E990A471492F78EE8386BCF430D66BDAEFDEAFBF912C8CF7CE46
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
20
DNS requests
5
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3952
759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
GET
200
92.113.29.113:80
http://xianggrhen.com/beetles/Twxhuggwipj.mp4
unknown
unknown
2120
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
3036
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
51.132.193.104:443
MICROSOFT-CORP-MSN-AS-BLOCK
GB
unknown
5172
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
3952
759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
92.113.29.113:80
xianggrhen.com
PJSC Ukrtelecom
UA
unknown
2120
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5172
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
xianggrhen.com
  • 92.113.29.113
unknown
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted

Threats

PID
Process
Class
Message
2624
759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
A Network Trojan was detected
LOADER [ANY.RUN] PureLogs Download Attempt (LOAD)
2624
759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
A Network Trojan was detected
STEALER [ANY.RUN] PureLogs Stealer Exfiltration
1 ETPRO signatures available at the full report
Process
Message
759971b82a183c44275cf9c6ba75c27d879644d979eef9a19d1093d480804fc1N.exe
Verify completed in 0 milliseconds, total of 1 times in 0 milliseconds.