File name:

Pagamento.UniCredit.pdf.exe

Full analysis: https://app.any.run/tasks/90d369c7-711a-4d20-9f08-7a76ab4dadd3
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: November 19, 2024, 11:48:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
remote
purecrypter
netreactor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

6D99C0CD5292F377D7334AD0A90A19F4

SHA1:

6DE58E451707B34166DC132876D4C726DBB85E59

SHA256:

9B91F38ED7A92A5B3223698C5BE0BB0DAAA1230981501FD306F5B30744317BBC

SSDEEP:

384:HBf0l1afi24Lw2zezXAVneOXOc/poKcvg+fyLOPBJ:XiA2STAVneOd+9vxMOPv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PURECRYPTER has been detected (YARA)

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • REMCOS has been detected (YARA)

      • InstallUtil.exe (PID: 4340)
    • REMCOS has been detected (SURICATA)

      • InstallUtil.exe (PID: 4340)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • Connects to unusual port

      • InstallUtil.exe (PID: 4340)
    • Contacting a server suspected of hosting an CnC

      • InstallUtil.exe (PID: 4340)
  • INFO

    • Reads the software policy settings

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • Disables trace logs

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • Reads the computer name

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • Reads the machine GUID from the registry

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • Manual execution by a user

      • InstallUtil.exe (PID: 4340)
    • Checks proxy server information

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • .NET Reactor protector has been detected

      • Pagamento.UniCredit.pdf.exe (PID: 444)
    • Checks supported languages

      • Pagamento.UniCredit.pdf.exe (PID: 444)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(4340) InstallUtil.exe
C2 (1)162.251.122.76:7119
BotnetRemoteHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueRemcos
Hide_fileFalse
Mutex_nameRmc-P2SX34
Keylog_flag0
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirremcos
Max_keylog_file100000
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:19 10:45:52+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 4096
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x2fee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Pagamento.UniCredit.pdf
FileVersion: 1.0.0.0
InternalName: Pagamento.UniCredit.pdf.exe
LegalCopyright: Copyright © 2012
LegalTrademarks: -
OriginalFileName: Pagamento.UniCredit.pdf.exe
ProductName: Pagamento.UniCredit.pdf
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
111
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PURECRYPTER pagamento.unicredit.pdf.exe #REMCOS installutil.exe

Process information

PID
CMD
Path
Indicators
Parent process
444"C:\Users\admin\Desktop\Pagamento.UniCredit.pdf.exe" C:\Users\admin\Desktop\Pagamento.UniCredit.pdf.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Pagamento.UniCredit.pdf
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\pagamento.unicredit.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4340"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Remcos
(PID) Process(4340) InstallUtil.exe
C2 (1)162.251.122.76:7119
BotnetRemoteHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueRemcos
Hide_fileFalse
Mutex_nameRmc-P2SX34
Keylog_flag0
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirremcos
Max_keylog_file100000
Total events
5 040
Read events
5 024
Write events
16
Delete events
0

Modification events

(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(444) Pagamento.UniCredit.pdf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pagamento_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
444Pagamento.UniCredit.pdf.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EvidenceObject.vbstext
MD5:91B78B88B97025920D4E5AAACD5CAA80
SHA256:402325F07ACCCD930338010A1BA33B98F3E4A3808F7F4B2E3241C332E2E5706A
444Pagamento.UniCredit.pdf.exeC:\Users\admin\AppData\Roaming\EvidenceObject.exeexecutable
MD5:6D99C0CD5292F377D7334AD0A90A19F4
SHA256:9B91F38ED7A92A5B3223698C5BE0BB0DAAA1230981501FD306F5B30744317BBC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
101
DNS requests
7
Threats
166

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4932
svchost.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4932
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
64.31.43.234:443
https://inspirecollege.co.uk/trashss/Jpmfwq.wav
unknown
binary
1.13 Mb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4932
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
444
Pagamento.UniCredit.pdf.exe
64.31.43.234:443
inspirecollege.co.uk
LIMESTONENETWORKS
US
malicious
4712
MoUsoCoreWorker.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4932
svchost.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4932
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.46
whitelisted
inspirecollege.co.uk
  • 64.31.43.234
unknown
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 52.182.143.214
whitelisted

Threats

PID
Process
Class
Message
4340
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4340
InstallUtil.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4340
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4340
InstallUtil.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4340
InstallUtil.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4340
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4340
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4340
InstallUtil.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4340
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4340
InstallUtil.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
No debug info