File name:

831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe

Full analysis: https://app.any.run/tasks/64f6a2b4-ca7a-4001-b259-39d2196f4e51
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: February 15, 2025, 03:42:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
purecrypter
purelogs
exfiltration
stealer
zgrat
netreactor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

7351C20933CDB70BB83CCE6725F74FDC

SHA1:

83DC17DFC1058B369B27F09C560095346D7B6B6B

SHA256:

831671A9EE0A11C89793297F87AC535E049E1EA31B02A4A162BD4B103C44A667

SSDEEP:

49152:iTes2ADjOhn8kL2owxnV/m21XUNoEIPnMCbOCIlOCIM6o34NjgtcP9oVBqwX/4kZ:MesVYn8kL2owx71eojPcC3Cb6o349gtZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • PURECRYPTER has been detected (SURICATA)

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • PURECRYPTER has been detected (YARA)

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • [YARA] zgRAT detected by memory dumps

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Actions looks like stealing of personal data

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Steals credentials from Web Browsers

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • PURELOGS has been detected (SURICATA)

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Scans artifacts that could help determine the target

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • Application launched itself

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • Reads security settings of Internet Explorer

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Connects to unusual port

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • The process creates files with name similar to system file names

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • Executable content was dropped or overwritten

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • There is functionality for taking screenshot (YARA)

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Checks Windows Trust Settings

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
  • INFO

    • Creates files or folders in the user directory

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • Checks supported languages

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Create files in a temporary directory

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • Reads the software policy settings

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • The sample compiled with english language support

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
    • Reads the computer name

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6516)
      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Checks proxy server information

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Reads the machine GUID from the registry

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • .NET Reactor protector has been detected

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
    • Reads Microsoft Office registry keys

      • 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe (PID: 6832)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:12:11 21:50:23+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24576
InitializedDataSize: 3782656
UninitializedDataSize: 1024
EntryPoint: 0x3180
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.5.0.0
ProductVersionNumber: 3.5.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: brnefilm
LegalCopyright: eleidin
LegalTrademarks: tortil haster
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe #PURECRYPTER 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6516"C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe" C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6832"C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe" C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\users\admin\desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
6 018
Read events
5 472
Write events
546
Delete events
0

Modification events

(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CLI\Start
Operation:writeName:CLI start
Value:
2
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\conflict\reputation\Huemul
Operation:writeName:siskner
Value:
%Forhaabningsfulde%\eyeless\klirrendes.but
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\Naturligeres\Unexploited24\Dryaders
Operation:writeName:nontheoretic
Value:
FFB69A28
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\SOFTWARE\Service
Operation:writeName:System_Check
Value:
kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\SOFTWARE\Service
Operation:writeName:System_Check
Value:
kernel32::SetFilePointer(i r5, i 13101 , i 0,i 0)
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\SOFTWARE\Service
Operation:writeName:System_Check
Value:
kernel32::VirtualAlloc(i 0,i 30982144, i 0x3000, i 0x40)p.r2
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\SOFTWARE\Service
Operation:writeName:System_Check
Value:
kernel32::ReadFile(i r5, i r2, i 30982144,*i 0, i 0)
(PID) Process:(6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeKey:HKEY_CURRENT_USER\SOFTWARE\Service
Operation:writeName:System_Check
Value:
user32::EnumWindows(i r2 ,i 0)
Executable files
1
Suspicious files
6
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Opinionsmaalings\coprodaeum.sla
MD5:
SHA256:
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Periodicalize\afdelingsjordemoder.jpgimage
MD5:07AD72871AFA0B6CF52D55AD19D3215E
SHA256:09C496EC2309CE74DD64D98A21F7CA1843C27B03DFDA58B6D7E968B29837EE23
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Periodicalize\Frerhold.txttext
MD5:5386FB7E3D12D93EC0284B943A6A43FA
SHA256:D2B96A6F36627B945492B5AD960B3E12281310E6F7287130866F824A230E2672
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Mejemaskinens.Foebinary
MD5:55CCDDA79685D00311246AB1FF53AF30
SHA256:922DD4C2397AA242963CDB82FA4F57AA1DA97A8C42DA74CEAAE0F361AFB7F4B1
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Benjoin210.unebinary
MD5:7A74CD3FE97ED3F7A1FE85B872C54196
SHA256:7AA0A6F905D3503CEF36B9CB64C6FAA269FC6EFB1ACAA778F8313C9B2D4ABBF0
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Bygningskonduktrens.Tokbinary
MD5:3971D3991C2286AC17959DCD0FFDDE72
SHA256:16B8B9716FCD03483367FD02DC1CC4FBB803A4A4CA585F8A5E52990983FCEC12
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Periodicalize\bilfragternes.txtimage
MD5:66BBEA8F1EEA15C013EB25F6502B1F71
SHA256:DE165D8C0F8D891013F9217821FB91F3CB78BC223547757B9EBD07C739C30687
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\carboxyl.jpgimage
MD5:CA1A8EDC0794AA2F7E00F2DA5DB8AC4F
SHA256:BA0951524999BAB2F15B34660E4DFD4FC1C13E91CA28636D9CF8AD13598CFCEF
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\Temp\nsh7718.tmp\System.dllexecutable
MD5:3F176D1EE13B0D7D6BD92E1C7A0B9BAE
SHA256:FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E
6516831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exeC:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Opinionsmaalings\deynt.probinary
MD5:52E6EC2BDBBE19F9CF8F6AC2A5D06FC7
SHA256:27E548B1F944836D314F394E244889A6B6ACAE735ED6A14EE3000824056C8FBA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
20
DNS requests
9
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
1.01 Kb
whitelisted
GET
303
216.58.206.46:443
https://drive.google.com/uc?export=download&id=1pCoF543aDYa2m6SDHsiVOdiXJiDUV5pQ
US
unknown
GET
200
172.217.18.1:443
https://drive.usercontent.google.com/download?id=1pCoF543aDYa2m6SDHsiVOdiXJiDUV5pQ&export=download
US
binary
360 Kb
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
NL
binary
973 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3976
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6832
831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
216.58.206.46:443
drive.google.com
GOOGLE
US
whitelisted
6832
831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
172.217.18.1:443
drive.usercontent.google.com
GOOGLE
US
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.106
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
drive.google.com
  • 216.58.206.46
whitelisted
drive.usercontent.google.com
  • 172.217.18.1
whitelisted
ghos008.duckdns.org
  • 46.161.0.101
unknown
self.events.data.microsoft.com
  • 40.79.141.153
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain
2192
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain
6832
831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
A Network Trojan was detected
LOADER [ANY.RUN] PureLogs Download Attempt (LOAD)
6832
831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
STEALER [ANY.RUN] PureLogs Stealer Exfiltration
6832
831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe
A Network Trojan was detected
STEALER [ANY.RUN] PureLogs Stealer Exfiltration
No debug info