download:

/Nkgyx.zip

Full analysis: https://app.any.run/tasks/4c6e9d75-d639-4602-94a2-3c6326623779
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: April 04, 2025, 08:04:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
purecrypter
netreactor
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

C3078D6D69D2D52C9A73158FBFCCCB16

SHA1:

DAFEF353878BEF008FF526A4EDC1885B56AF936E

SHA256:

8CC70FA793C6A086FC1DFAD3C3EE210DD1CC158BBFB4B6AE2EF915F9CE233ED4

SSDEEP:

1536:faebZmcfiaR2ZGmFK6jU2PUrE5KbzuSMrross3Yg4IuH1v0zKiT:Sebhi7ZGmFK0PUE5mSSMJs3JjsR0zN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • New Order_PO 354688976.scr (PID: 5956)
    • PURECRYPTER has been detected (YARA)

      • New Order_PO 354688976.scr (PID: 5956)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • WinRAR.exe (PID: 6068)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6068)
    • Executable content was dropped or overwritten

      • New Order_PO 354688976.scr (PID: 5956)
    • Connects to unusual port

      • RegAsm.exe (PID: 4120)
  • INFO

    • Checks proxy server information

      • New Order_PO 354688976.scr (PID: 5956)
      • New Order_PO 354688976.scr (PID: 1568)
    • Reads the computer name

      • New Order_PO 354688976.scr (PID: 5956)
      • New Order_PO 354688976.scr (PID: 1568)
      • RegAsm.exe (PID: 4120)
      • RegAsm.exe (PID: 208)
    • Disables trace logs

      • New Order_PO 354688976.scr (PID: 5956)
      • New Order_PO 354688976.scr (PID: 1568)
    • Reads the machine GUID from the registry

      • New Order_PO 354688976.scr (PID: 5956)
      • New Order_PO 354688976.scr (PID: 1568)
      • RegAsm.exe (PID: 4120)
      • RegAsm.exe (PID: 208)
    • Checks supported languages

      • New Order_PO 354688976.scr (PID: 5956)
      • RegAsm.exe (PID: 4120)
      • New Order_PO 354688976.scr (PID: 1568)
      • RegAsm.exe (PID: 208)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6068)
    • Reads the software policy settings

      • New Order_PO 354688976.scr (PID: 5956)
      • New Order_PO 354688976.scr (PID: 1568)
    • Creates files or folders in the user directory

      • New Order_PO 354688976.scr (PID: 5956)
    • Manual execution by a user

      • RegAsm.exe (PID: 4120)
      • New Order_PO 354688976.scr (PID: 1568)
      • RegAsm.exe (PID: 208)
    • .NET Reactor protector has been detected

      • New Order_PO 354688976.scr (PID: 5956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:01:28 11:13:28
ZipCRC: 0x8e76f3c7
ZipCompressedSize: 75351
ZipUncompressedSize: 246272
ZipFileName: New Order_PO 354688976.scr
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs #PURECRYPTER new order_po 354688976.scr regasm.exe new order_po 354688976.scr regasm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1568"C:\Users\admin\Desktop\New Order_PO 354688976.scr" /SC:\Users\admin\Desktop\New Order_PO 354688976.scr
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Sorsnpx
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\new order_po 354688976.scr
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3956"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4120"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5956"C:\Users\admin\AppData\Local\Temp\Rar$DIa6068.21942\New Order_PO 354688976.scr" /SC:\Users\admin\AppData\Local\Temp\Rar$DIa6068.21942\New Order_PO 354688976.scr
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Sorsnpx
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$dia6068.21942\new order_po 354688976.scr
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6068"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Nkgyx.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6572C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
4 480
Read events
4 432
Write events
35
Delete events
13

Modification events

(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Nkgyx.zip
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5956) New Order_PO 354688976.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New Order_PO 354688976_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5956) New Order_PO 354688976.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New Order_PO 354688976_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
3
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6068WinRAR.exeC:\Users\admin\Desktop\New Order_PO 354688976.screxecutable
MD5:B3877DAB52BF86B35480AE77F8156CC1
SHA256:5F69A72A1D999EBDDAEBD22A7218479A7651C16DB3435D557BC94FB1F3EA1B08
5956New Order_PO 354688976.scrC:\Users\admin\AppData\Roaming\KeyAlgorithm.exeexecutable
MD5:B3877DAB52BF86B35480AE77F8156CC1
SHA256:5F69A72A1D999EBDDAEBD22A7218479A7651C16DB3435D557BC94FB1F3EA1B08
6068WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa6068.21942\New Order_PO 354688976.screxecutable
MD5:B3877DAB52BF86B35480AE77F8156CC1
SHA256:5F69A72A1D999EBDDAEBD22A7218479A7651C16DB3435D557BC94FB1F3EA1B08
5956New Order_PO 354688976.scrC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KeyAlgorithm.vbstext
MD5:398C60E4F742F05D3EAEF11E73C74ED0
SHA256:318BBDDB1CDE7F83EDBCAD8CAF15FBFDD25965FF93C942F35690D14A3DB4D508
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.23:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.216.77.23:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5720
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5720
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.23:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.23:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5956
New Order_PO 354688976.scr
163.44.185.218:443
epihealth.jp
GMO Internet,Inc
JP
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.216.77.23
  • 23.216.77.18
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
login.live.com
  • 20.190.159.23
  • 40.126.31.0
  • 40.126.31.73
  • 20.190.159.64
  • 40.126.31.1
  • 20.190.159.71
  • 20.190.159.128
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
epihealth.jp
  • 163.44.185.218
unknown
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info