| File name: | 578c5decd0935c68a1c22e6dbef870a8.exe |
| Full analysis: | https://app.any.run/tasks/99212b05-c9fa-4dfe-af3e-0d6b75be7cc3 |
| Verdict: | Malicious activity |
| Threats: | First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system. |
| Analysis date: | August 01, 2024, 20:14:04 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (console) x86-64, for MS Windows |
| MD5: | 578C5DECD0935C68A1C22E6DBEF870A8 |
| SHA1: | F3958CB53BCF7AC56DB17FA5E0FBB9993BDC8D8C |
| SHA256: | 95DBF4EB70AA8D236DF3C159E8D3ABDC174257767326C2F27D05C418065E772C |
| SSDEEP: | 98304:ox6bCHrwQW7Oki1mF8nS9iT6Ck8jqLK05mZ4La7qOcqoIlpEX5:H |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:07:29 13:01:53+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.4 |
| CodeSize: | 1263616 |
| InitializedDataSize: | 1729024 |
| UninitializedDataSize: | 383488 |
| EntryPoint: | 0x68e38 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 9.47.228.37 |
| ProductVersionNumber: | 9.47.228.37 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | getPerMilleSymbolIsAddressGreaterThan |
| FileDescription: | getPerMilleSymbolIsAddressGreaterThan |
| FileVersion: | 9.47.228.37 |
| InternalName: | getPerMilleSymbolIsAddressGreaterThan.dll |
| LegalCopyright: | |
| OriginalFileName: | getPerMilleSymbolIsAddressGreaterThan.dll |
| ProductName: | getPerMilleSymbolIsAddressGreaterThan |
| ProductVersion: | 9.47.228.37 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6992 | "C:\Users\admin\AppData\Local\Temp\578c5decd0935c68a1c22e6dbef870a8.exe" | C:\Users\admin\AppData\Local\Temp\578c5decd0935c68a1c22e6dbef870a8.exe | — | explorer.exe | |||||||||||
User: admin Company: getPerMilleSymbolIsAddressGreaterThan Integrity Level: MEDIUM Description: getPerMilleSymbolIsAddressGreaterThan Exit code: 0 Version: 9.47.228.37 Modules
| |||||||||||||||
| 7000 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | 578c5decd0935c68a1c22e6dbef870a8.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7100 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe | 578c5decd0935c68a1c22e6dbef870a8.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Framework CAS Policy Manager Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| (PID) Process: | (7100) CasPol.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (7100) CasPol.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (7100) CasPol.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (7100) CasPol.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Kphsrhmf.tmpdb | — | |
MD5:— | SHA256:— | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Advmh.tmp | sqlite | |
MD5:06AD9E737639FDC745B3B65312857109 | SHA256:C8925892CA8E213746633033AE95ACFB8DD9531BC376B82066E686AC6F40A404 | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Sbelmbjzu.tmpdb | sqlite | |
MD5:0B2213BCE3950F1E95FEEB8E8B3B9543 | SHA256:71DB3D87713A320BA9FD3043392509B430630CFCF574EE84118406D6471CFC5A | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Bfehxokcjt.tmpdb | binary | |
MD5:95FFD778940E6DF4846B0B12C8DD5821 | SHA256:21A2DEBD389DB456465DFEFFDB15F0AF3FBC46F007CBA67513A13EB10D14E94F | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Turgmby.tmpdb | binary | |
MD5:95FFD778940E6DF4846B0B12C8DD5821 | SHA256:21A2DEBD389DB456465DFEFFDB15F0AF3FBC46F007CBA67513A13EB10D14E94F | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Jtcqxnh.tmpdb | sqlite | |
MD5:0B2213BCE3950F1E95FEEB8E8B3B9543 | SHA256:71DB3D87713A320BA9FD3043392509B430630CFCF574EE84118406D6471CFC5A | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Tguaxmayqf.tmp | binary | |
MD5:31EF1E93260AED2FED884531149F5171 | SHA256:F2E9869285B794BF4B14BBB67CA6E680BC46BE8FD0DA55F4A7745F34E84815B7 | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Gsjvxxu.tmpdb | sqlite | |
MD5:F6C33AC5E1032A0873BE7BFC65169287 | SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83 | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Bnrwdqvb.tmpdb | sqlite | |
MD5:0B2213BCE3950F1E95FEEB8E8B3B9543 | SHA256:71DB3D87713A320BA9FD3043392509B430630CFCF574EE84118406D6471CFC5A | |||
| 7100 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\Oiaeroiewp.tmpdb | sqlite | |
MD5:95FFD778940E6DF4846B0B12C8DD5821 | SHA256:21A2DEBD389DB456465DFEFFDB15F0AF3FBC46F007CBA67513A13EB10D14E94F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
4540 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6668 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6692 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
876 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
1184 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5336 | SearchApp.exe | 2.16.110.171:443 | www.bing.com | Akamai International B.V. | DE | unknown |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4540 | svchost.exe | 20.190.160.22:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3260 | svchost.exe | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4540 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
th.bing.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7100 | CasPol.exe | A Network Trojan was detected | LOADER [ANY.RUN] PureLogs Download Attempt (LOAD) |
7100 | CasPol.exe | A Network Trojan was detected | STEALER [ANY.RUN] PureLogs Stealer Exfiltration |