File name:

FAKTURA WDT 539SIE042025_pdf .exe

Full analysis: https://app.any.run/tasks/4bd67b42-c690-4e2f-a8a0-11659dd9103f
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: April 27, 2025, 13:15:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
purecrypter
netreactor
purelogs
stealer
exfiltration
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

CC761DDC48D5E536D78161B2098216E0

SHA1:

DB9F9EC891DAB5E3D2A7BA877B7F6C1F0DC56541

SHA256:

E5F8CDE1A18C395F639E94B3387760BC52C48555BCC3A84233FC5D81E8970304

SSDEEP:

768:EmwCCDSDf4QUmOYKaKkhTrMewf+j0jW7oJBVhjFd25gK5FTeHVF5X3zCWH:EZEDOYNhTrMeIo7oJ7AWjF5lH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PURECRYPTER has been detected (YARA)

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
    • PURECRYPTER has been detected (SURICATA)

      • InstallUtil.exe (PID: 8032)
    • Scans artifacts that could help determine the target

      • InstallUtil.exe (PID: 8032)
    • Actions looks like stealing of personal data

      • InstallUtil.exe (PID: 8032)
    • Steals credentials from Web Browsers

      • InstallUtil.exe (PID: 8032)
    • PURELOGS has been detected (SURICATA)

      • InstallUtil.exe (PID: 8032)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
    • Reads security settings of Internet Explorer

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
    • Process uses IPCONFIG to renew DHCP configuration

      • cmd.exe (PID: 8068)
    • Connects to unusual port

      • InstallUtil.exe (PID: 8032)
  • INFO

    • Process checks computer location settings

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
    • Checks proxy server information

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
      • slui.exe (PID: 5064)
    • Reads the machine GUID from the registry

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
      • InstallUtil.exe (PID: 8032)
    • Checks supported languages

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
      • InstallUtil.exe (PID: 8032)
    • Disables trace logs

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
    • Reads the computer name

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
      • InstallUtil.exe (PID: 8032)
    • .NET Reactor protector has been detected

      • FAKTURA WDT 539SIE042025_pdf .exe (PID: 2504)
    • Manual execution by a user

      • InstallUtil.exe (PID: 8032)
    • Reads Microsoft Office registry keys

      • InstallUtil.exe (PID: 8032)
    • Reads the software policy settings

      • slui.exe (PID: 7340)
      • slui.exe (PID: 5064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:24 13:21:42+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 51712
InitializedDataSize: 7168
UninitializedDataSize: -
EntryPoint: 0xe9be
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.4639.4029
ProductVersionNumber: 1.0.4639.4029
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Wiofzpkab
FileVersion: 1.0.4639.4029
InternalName: Wiofzpkab.exe
LegalCopyright: Copyright © 2013
LegalTrademarks: -
OriginalFileName: Wiofzpkab.exe
ProductName: Wiofzpkab
ProductVersion: 1.0.4639.4029
AssemblyVersion: 1.0.1685.12323
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
10
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PURECRYPTER faktura wdt 539sie042025_pdf                          .exe sppextcomobj.exe no specs cmd.exe no specs conhost.exe no specs slui.exe #PURECRYPTER installutil.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2504"C:\Users\admin\AppData\Local\Temp\FAKTURA WDT 539SIE042025_pdf .exe" C:\Users\admin\AppData\Local\Temp\FAKTURA WDT 539SIE042025_pdf .exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Wiofzpkab
Exit code:
4294967295
Version:
1.0.4639.4029
Modules
Images
c:\users\admin\appdata\local\temp\faktura wdt 539sie042025_pdf .exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5064C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7272C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7292"C:\Windows\System32\cmd.exe" /c ipconfig /releaseC:\Windows\SysWOW64\cmd.exeFAKTURA WDT 539SIE042025_pdf .exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7340"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8032"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
8068"C:\Windows\System32\cmd.exe" /c ipconfig /renewC:\Windows\SysWOW64\cmd.exeFAKTURA WDT 539SIE042025_pdf .exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8076\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8124ipconfig /renewC:\Windows\SysWOW64\ipconfig.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
3 881
Read events
3 867
Write events
14
Delete events
0

Modification events

(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2504) FAKTURA WDT 539SIE042025_pdf .exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FAKTURA WDT 539SIE042025_pdf _RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
29
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.55.236.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.55.236.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2504
FAKTURA WDT 539SIE042025_pdf .exe
GET
200
95.214.54.164:80
http://95.214.54.164/zone/Akfwigva.mp3
unknown
unknown
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7912
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7912
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.55.236.72:80
crl.microsoft.com
AKAMAI-AS
US
whitelisted
5496
MoUsoCoreWorker.exe
23.55.236.72:80
crl.microsoft.com
AKAMAI-AS
US
whitelisted
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2504
FAKTURA WDT 539SIE042025_pdf .exe
95.214.54.164:80
Meverywhere sp. z o.o.
PL
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.63.118.230:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.55.236.72
  • 23.55.236.70
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
google.com
  • 142.250.186.142
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.132
  • 40.126.32.133
  • 20.190.160.2
  • 20.190.160.64
  • 20.190.160.67
  • 40.126.32.76
  • 20.190.160.4
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.48
whitelisted

Threats

PID
Process
Class
Message
8032
InstallUtil.exe
A Network Trojan was detected
LOADER [ANY.RUN] PureLogs Download Attempt (LOAD)
8032
InstallUtil.exe
A Network Trojan was detected
STEALER [ANY.RUN] PureLogs Stealer Exfiltration
No debug info