| File name: | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe |
| Full analysis: | https://app.any.run/tasks/64f6a2b4-ca7a-4001-b259-39d2196f4e51 |
| Verdict: | Malicious activity |
| Threats: | First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system. |
| Analysis date: | February 15, 2025, 03:42:58 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | 7351C20933CDB70BB83CCE6725F74FDC |
| SHA1: | 83DC17DFC1058B369B27F09C560095346D7B6B6B |
| SHA256: | 831671A9EE0A11C89793297F87AC535E049E1EA31B02A4A162BD4B103C44A667 |
| SSDEEP: | 49152:iTes2ADjOhn8kL2owxnV/m21XUNoEIPnMCbOCIlOCIM6o34NjgtcP9oVBqwX/4kZ:MesVYn8kL2owx71eojPcC3Cb6o349gtZ |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:12:11 21:50:23+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24576 |
| InitializedDataSize: | 3782656 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x3180 |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.5.0.0 |
| ProductVersionNumber: | 3.5.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| Comments: | brnefilm |
| LegalCopyright: | eleidin |
| LegalTrademarks: | tortil haster |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6516 | "C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe" | C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6832 | "C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe" | C:\Users\admin\Desktop\831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CLI\Start |
| Operation: | write | Name: | CLI start |
Value: 2 | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\conflict\reputation\Huemul |
| Operation: | write | Name: | siskner |
Value: %Forhaabningsfulde%\eyeless\klirrendes.but | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\Naturligeres\Unexploited24\Dryaders |
| Operation: | write | Name: | nontheoretic |
Value: FFB69A28 | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
| Operation: | write | Name: | System_Check |
Value: kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5 | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
| Operation: | write | Name: | System_Check |
Value: kernel32::SetFilePointer(i r5, i 13101 , i 0,i 0) | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
| Operation: | write | Name: | System_Check |
Value: kernel32::VirtualAlloc(i 0,i 30982144, i 0x3000, i 0x40)p.r2 | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
| Operation: | write | Name: | System_Check |
Value: kernel32::ReadFile(i r5, i r2, i 30982144,*i 0, i 0) | |||
| (PID) Process: | (6516) 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
| Operation: | write | Name: | System_Check |
Value: user32::EnumWindows(i r2 ,i 0) | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Opinionsmaalings\coprodaeum.sla | — | |
MD5:— | SHA256:— | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Periodicalize\afdelingsjordemoder.jpg | image | |
MD5:07AD72871AFA0B6CF52D55AD19D3215E | SHA256:09C496EC2309CE74DD64D98A21F7CA1843C27B03DFDA58B6D7E968B29837EE23 | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Periodicalize\Frerhold.txt | text | |
MD5:5386FB7E3D12D93EC0284B943A6A43FA | SHA256:D2B96A6F36627B945492B5AD960B3E12281310E6F7287130866F824A230E2672 | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Mejemaskinens.Foe | binary | |
MD5:55CCDDA79685D00311246AB1FF53AF30 | SHA256:922DD4C2397AA242963CDB82FA4F57AA1DA97A8C42DA74CEAAE0F361AFB7F4B1 | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Benjoin210.une | binary | |
MD5:7A74CD3FE97ED3F7A1FE85B872C54196 | SHA256:7AA0A6F905D3503CEF36B9CB64C6FAA269FC6EFB1ACAA778F8313C9B2D4ABBF0 | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Bygningskonduktrens.Tok | binary | |
MD5:3971D3991C2286AC17959DCD0FFDDE72 | SHA256:16B8B9716FCD03483367FD02DC1CC4FBB803A4A4CA585F8A5E52990983FCEC12 | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Periodicalize\bilfragternes.txt | image | |
MD5:66BBEA8F1EEA15C013EB25F6502B1F71 | SHA256:DE165D8C0F8D891013F9217821FB91F3CB78BC223547757B9EBD07C739C30687 | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\carboxyl.jpg | image | |
MD5:CA1A8EDC0794AA2F7E00F2DA5DB8AC4F | SHA256:BA0951524999BAB2F15B34660E4DFD4FC1C13E91CA28636D9CF8AD13598CFCEF | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\Temp\nsh7718.tmp\System.dll | executable | |
MD5:3F176D1EE13B0D7D6BD92E1C7A0B9BAE | SHA256:FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E | |||
| 6516 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | C:\Users\admin\AppData\Local\trder\unacquisitiveness\skaldyrsalaters\Opinionsmaalings\deynt.pro | binary | |
MD5:52E6EC2BDBBE19F9CF8F6AC2A5D06FC7 | SHA256:27E548B1F944836D314F394E244889A6B6ACAE735ED6A14EE3000824056C8FBA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 1.01 Kb | whitelisted |
— | — | GET | 303 | 216.58.206.46:443 | https://drive.google.com/uc?export=download&id=1pCoF543aDYa2m6SDHsiVOdiXJiDUV5pQ | US | — | — | unknown |
— | — | GET | 200 | 172.217.18.1:443 | https://drive.usercontent.google.com/download?id=1pCoF543aDYa2m6SDHsiVOdiXJiDUV5pQ&export=download | US | binary | 360 Kb | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | NL | binary | 973 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.16.164.9:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3976 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6832 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | 216.58.206.46:443 | drive.google.com | GOOGLE | US | whitelisted |
6832 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | 172.217.18.1:443 | drive.usercontent.google.com | GOOGLE | US | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
drive.google.com |
| whitelisted |
drive.usercontent.google.com |
| whitelisted |
ghos008.duckdns.org |
| unknown |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain |
2192 | svchost.exe | Misc activity | ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain |
6832 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | A Network Trojan was detected | LOADER [ANY.RUN] PureLogs Download Attempt (LOAD) |
6832 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | STEALER [ANY.RUN] PureLogs Stealer Exfiltration | |
6832 | 831671a9ee0a11c89793297f87ac535e049e1ea31b02a4a162bd4b103c44a667.exe | A Network Trojan was detected | STEALER [ANY.RUN] PureLogs Stealer Exfiltration |