File name:

pppp.exe

Full analysis: https://app.any.run/tasks/c38f12a4-956f-46f8-9ea4-f54462a204f9
Verdict: Malicious activity
Analysis date: July 20, 2024, 20:04:34
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

7F3A738BA2AEF448AD6714C9780237AD

SHA1:

0B0BEE65BEBAB0FFB1C6A19F04195F50647ED3E2

SHA256:

0BABF6E193C1E19692D7651CE6D2299B9A41A8DDCF4AE0C55C72E212E6BD42C6

SSDEEP:

98304:qRKcYAddP3kTWSZhPLTNK8D96+Jx75sUst36BeA9T9iplO99rb/GqNM+1Fqi8i31:QUPbyhGj65

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • pppp.exe (PID: 1456)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • pppp.exe (PID: 1456)
    • Executable content was dropped or overwritten

      • pppp.exe (PID: 1456)
    • Process drops python dynamic module

      • pppp.exe (PID: 1456)
    • The process drops C-runtime libraries

      • pppp.exe (PID: 1456)
    • Application launched itself

      • pppp.exe (PID: 1456)
    • Loads Python modules

      • pppp.exe (PID: 4496)
  • INFO

    • Checks supported languages

      • pppp.exe (PID: 1456)
      • pppp.exe (PID: 4496)
    • Reads the computer name

      • pppp.exe (PID: 1456)
    • Create files in a temporary directory

      • pppp.exe (PID: 1456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:02:25 15:43:03+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 172032
InitializedDataSize: 153600
UninitializedDataSize: -
EntryPoint: 0xb7d0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pppp.exe conhost.exe no specs pppp.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1456"C:\Users\admin\AppData\Local\Temp\pppp.exe" C:\Users\admin\AppData\Local\Temp\pppp.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\pppp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2768\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepppp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4496"C:\Users\admin\AppData\Local\Temp\pppp.exe" C:\Users\admin\AppData\Local\Temp\pppp.exepppp.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\pppp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
337
Read events
337
Write events
0
Delete events
0

Modification events

No data
Executable files
10
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\base_library.zipcompressed
MD5:CCEE0EA5BA04AA4FCB1D5A19E976B54F
SHA256:EEB7F0B3E56B03454868411D5F62F23C1832C27270CEE551B9CA7D9D10106B29
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\_hashlib.pydexecutable
MD5:8BAEB2BD6E52BA38F445EF71EF43A6B8
SHA256:6C50C9801A5CAF0BB52B384F9A0D5A4AA182CA835F293A39E8999CF6EDF2F087
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\_decimal.pydexecutable
MD5:F78F9855D2A7CA940B6BE51D68B80BF2
SHA256:D4AE192BBD4627FC9487A2C1CD9869D1B461C20CFD338194E87F5CF882BBED12
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\libcrypto-3.dllexecutable
MD5:51E8A5281C2092E45D8C97FBDBF39560
SHA256:2A234B5AA20C3FAECF725BBB54FB33F3D94543F78FA7045408E905593E49960A
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\_lzma.pydexecutable
MD5:CF8DE1137F36141AFD9FF7C52A3264EE
SHA256:22D10E2D6AD3E3ED3C49EB79AB69A81AAA9D16AECA7F948DA2FE80877F106C16
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\_bz2.pydexecutable
MD5:90F58F625A6655F80C35532A087A0319
SHA256:BD8621FCC901FA1DE3961D93184F61EA71068C436794AF2A4449738CCF949946
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\select.pydexecutable
MD5:E1604AFE8244E1CE4C316C64EA3AA173
SHA256:74CCA85600E7C17EA6532B54842E26D3CAE9181287CDF5A4A3C50AF4DAB785E5
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\_socket.pydexecutable
MD5:439B3AD279BEFA65BB40ECEBDDD6228B
SHA256:24017D664AF20EE3B89514539345CAAC83ECA34825FCF066A23E8A4C99F73E6D
1456pppp.exeC:\Users\admin\AppData\Local\Temp\_MEI14562\python312.dllexecutable
MD5:48EBFEFA21B480A9B0DBFC3364E1D066
SHA256:0CC4E557972488EB99EA4AEB3D29F3ADE974EF3BCD47C211911489A189A0B6F2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
34
DNS requests
13
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4716
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5620
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4.209.32.198:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.113.103.199:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2760
svchost.exe
40.113.103.199:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.73
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.75
  • 20.190.159.4
  • 40.126.31.69
  • 40.126.31.67
  • 40.126.31.71
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.110
whitelisted
licensing.mp.microsoft.com
  • 4.209.32.198
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
www.bing.com
  • 104.126.37.161
  • 104.126.37.130
  • 104.126.37.184
  • 104.126.37.162
  • 104.126.37.179
  • 104.126.37.186
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.171
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted

Threats

No threats detected
No debug info