File name:

SecuriteInfo.com.Win32.MalwareX-gen.16881.9809

Full analysis: https://app.any.run/tasks/ba93938e-cc68-4186-a1a9-6d592861506e
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: April 20, 2025, 15:23:17
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
purecrypter
netreactor
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A58F4B66D02C4C1B64B4CEEC7814270E

SHA1:

0BC648BCF24A5F9795ABAE39A906BD9506E76362

SHA256:

C9C476B7F3631B4811E3DC92BD5CA8431F3B146C5DC8EC692B5D88DE7883DBA2

SSDEEP:

49152:7+T8yLcFMkEHU/DW/4/WIUZKRN68QEoM8NWWpbBc4EVAhlRyrLRpf4QOeCC0Zv1z:Sws1HU/DW/qWIeKJFh8kWp1c4EQlRifl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • XWORM has been detected (YARA)

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • PURECRYPTER has been detected (YARA)

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • Connects to unusual port

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
  • INFO

    • Creates files or folders in the user directory

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • Checks supported languages

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • Auto-launch of the file from Startup directory

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • Reads the computer name

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • .NET Reactor protector has been detected

      • SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe (PID: 2384)
    • Reads the software policy settings

      • slui.exe (PID: 5588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2384) SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe
C2185.208.156.210:7000
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
Mutex7kxQZ6dw2tol2nDh
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:16 18:13:13+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 1039360
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xffaae
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: eric
FileVersion: 1.0.0.0
InternalName: eric.exe
LegalCopyright: Copyright © 2012
LegalTrademarks: -
OriginalFileName: eric.exe
ProductName: eric
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XWORM securiteinfo.com.win32.malwarex-gen.16881.9809.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2384"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
eric
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malwarex-gen.16881.9809.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
XWorm
(PID) Process(2384) SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exe
C2185.208.156.210:7000
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
Mutex7kxQZ6dw2tol2nDh
5588"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6468C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6640C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
1 082
Read events
1 082
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2384SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkbinary
MD5:4834C0744D86AF2C66C0A187A2820341
SHA256:F489A482DDB35D066BBBBF0D52B1CA6E2831690F64E5FF48EDDF29DBC9A94745
2384SecuriteInfo.com.Win32.MalwareX-gen.16881.9809.exeC:\Users\admin\AppData\Roaming\XClient.exeexecutable
MD5:A58F4B66D02C4C1B64B4CEEC7814270E
SHA256:C9C476B7F3631B4811E3DC92BD5CA8431F3B146C5DC8EC692B5D88DE7883DBA2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
80
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1324
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1324
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.43
  • 2.16.164.34
  • 2.16.164.17
  • 2.16.164.19
  • 2.16.164.35
  • 2.16.164.98
  • 2.16.164.49
  • 2.16.164.113
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 2.16.253.202
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.130
  • 20.190.159.131
  • 20.190.159.2
  • 20.190.159.73
  • 20.190.159.128
  • 20.190.159.129
  • 40.126.31.130
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info