File name:

build.exe

Full analysis: https://app.any.run/tasks/a28a3d22-8c55-4678-b734-ccc942ea4dae
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: November 29, 2024, 17:02:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
purecrypter
rat
remcos
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

2C4B3F00FF2A1958E4D390DEDB626F52

SHA1:

EEB0426A770708432F94D47F2FD9E4525EF7A090

SHA256:

CE7792FF95DCA6CD5B06083ACEFC42D131AAE24000A4FC1C67DA24F083DA9C6A

SSDEEP:

98304:kYnBJ6zfr244vkagwa0R1Loj/V3nLnfCttOQ/tT/EDos+lp0TOkZVdoVuayNmNi0:wjrgp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PURECRYPTER has been detected (SURICATA)

      • csc.exe (PID: 6892)
    • Starts Visual C# compiler

      • build.exe (PID: 6164)
    • Executing a file with an untrusted certificate

      • blxxu.exe (PID: 7148)
    • REMCOS has been detected (SURICATA)

      • InstallUtil.exe (PID: 2548)
    • Connects to the CnC server

      • InstallUtil.exe (PID: 2548)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • csc.exe (PID: 6892)
      • InstallUtil.exe (PID: 2548)
    • The process executes via Task Scheduler

      • blxxu.exe (PID: 7148)
    • Executable content was dropped or overwritten

      • blxxu.exe (PID: 7148)
      • csc.exe (PID: 6892)
    • Connects to unusual port

      • csc.exe (PID: 6892)
      • InstallUtil.exe (PID: 2548)
    • Checks for external IP

      • InstallUtil.exe (PID: 2548)
  • INFO

    • Checks supported languages

      • build.exe (PID: 6164)
    • Manual execution by a user

      • InstallUtil.exe (PID: 2548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 4744704
InitializedDataSize: 2830848
UninitializedDataSize: -
EntryPoint: 0x48619c
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.20.0.0
ProductVersionNumber: 6.20.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: H.D.S. Hungary
FileDescription: Hard Disk Sentinel
FileVersion: 6.20.0.0
InternalName: HDSentinel
LegalCopyright: Copyright © H.D.S. Hungary
LegalTrademarks: Copyright © H.D.S. Hungary
OriginalFileName: HDSentinel.exe
ProductName: Hard Disk Sentinel
ProductVersion: 6
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
4
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start build.exe no specs #PURECRYPTER csc.exe blxxu.exe #REMCOS installutil.exe

Process information

PID
CMD
Path
Indicators
Parent process
2548"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6164"C:\Users\admin\AppData\Local\Temp\build.exe" C:\Users\admin\AppData\Local\Temp\build.exeexplorer.exe
User:
admin
Company:
H.D.S. Hungary
Integrity Level:
MEDIUM
Description:
Hard Disk Sentinel
Exit code:
0
Version:
6.20.0.0
Modules
Images
c:\users\admin\appdata\local\temp\build.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6892"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
build.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7148"C:\Users\admin\AppData\Local\Temp\blxxu.exe"C:\Users\admin\AppData\Local\Temp\blxxu.exe
svchost.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Nexus Setup
Exit code:
4294967295
Version:
24.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\blxxu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
2 253
Read events
2 217
Write events
36
Delete events
0

Modification events

(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6892) csc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\csc_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6164build.exeC:\Users\admin\Videos\DiskTuner\Bin\DiskTuner.exe
MD5:
SHA256:
7148blxxu.exeC:\Users\admin\AppData\Roaming\Current.exeexecutable
MD5:5F74CC3FD517AACA55FBD0B0DEF9C21C
SHA256:FFF4D02C7C52C76ECF0565F143D50555A8BF6D530E457920CC5C7DF18AAC4D6C
2548InstallUtil.exeC:\ProgramData\registros\registros.datbinary
MD5:0C41461A0C8D83566EBEFFC6B20886D6
SHA256:29D573A17D15F439A0DA6234D871319DD0A7E59D054C105D8AE22623AF8164EA
2548InstallUtil.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\json[1].jsonbinary
MD5:11A4779582635F487306BCA811DD8DE0
SHA256:A322927FE8B71C36DCD9C933BF5E7A74F1564FA772829FDEB256706456266655
6892csc.exeC:\Users\admin\AppData\Local\Temp\blxxu.exeexecutable
MD5:5F74CC3FD517AACA55FBD0B0DEF9C21C
SHA256:FFF4D02C7C52C76ECF0565F143D50555A8BF6D530E457920CC5C7DF18AAC4D6C
7148blxxu.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Current.vbstext
MD5:D3090147D2D00D34BA831A255BD82048
SHA256:F3C67052B3718A4D6309C570B9D858B61C69F6F45A6BD70FCD1A3A13219EFCC7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
39
DNS requests
22
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.97:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7036
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7036
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2548
InstallUtil.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
malicious
4144
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3884
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.97:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
whitelisted
1076
svchost.exe
23.32.186.57:443
go.microsoft.com
AKAMAI-AS
BR
whitelisted
1176
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.97
  • 2.16.164.49
  • 2.16.164.18
  • 2.16.164.106
  • 2.16.164.43
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.52.120.96
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.179
  • 2.23.209.140
  • 2.23.209.189
  • 2.23.209.182
  • 2.23.209.133
  • 2.23.209.185
whitelisted
go.microsoft.com
  • 23.32.186.57
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.73
  • 20.190.159.4
  • 20.190.159.2
  • 40.126.31.73
  • 20.190.159.75
  • 40.126.31.67
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
probandonuevodomicolombia.cfd
  • 181.131.217.244
unknown
throac.net
  • 69.49.234.173
unknown

Threats

PID
Process
Class
Message
6892
csc.exe
Malware Command and Control Activity Detected
LOADER [ANY.RUN] PureLoader Download Attempt (LOAD)
7148
blxxu.exe
Potentially Bad Traffic
ET INFO Observed Temporary File Sharing Service Domain (litter .catbox .moe in TLS SNI)
2548
InstallUtil.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Checkin
2548
InstallUtil.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Server Response
2 ETPRO signatures available at the full report
No debug info