File name:

$RLIKEJQ.exe

Full analysis: https://app.any.run/tasks/6c17a175-f35c-45ae-9fb1-335af276f968
Verdict: Malicious activity
Analysis date: April 29, 2025, 10:30:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

D88CDD089AD632711A6F1594A1FFC019

SHA1:

CD2512A201C58322EFFBD1F4C458E7D4DB0BBD9F

SHA256:

11E5284FB493BF8B82DA12F9973FA1CF30C597A9C6EB54581E06DB48D697E446

SSDEEP:

98304:cCYzBadpQWtg3Ry77bdz3HIeSe8z94IfbPwMKeXt5xUtQen/Tqv9SrLlPSPXbBVV:F2ztwkWRyn6stJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • $RLIKEJQ.exe (PID: 7212)
    • Process drops legitimate windows executable

      • $RLIKEJQ.exe (PID: 7212)
    • Application launched itself

      • $RLIKEJQ.exe (PID: 7212)
    • Executable content was dropped or overwritten

      • $RLIKEJQ.exe (PID: 7212)
    • Loads Python modules

      • $RLIKEJQ.exe (PID: 7248)
    • The process drops C-runtime libraries

      • $RLIKEJQ.exe (PID: 7212)
    • There is functionality for taking screenshot (YARA)

      • $RLIKEJQ.exe (PID: 7212)
      • $RLIKEJQ.exe (PID: 7248)
  • INFO

    • Create files in a temporary directory

      • $RLIKEJQ.exe (PID: 7212)
    • Checks supported languages

      • $RLIKEJQ.exe (PID: 7212)
      • $RLIKEJQ.exe (PID: 7248)
    • Reads the computer name

      • $RLIKEJQ.exe (PID: 7212)
      • $RLIKEJQ.exe (PID: 7248)
    • The sample compiled with english language support

      • $RLIKEJQ.exe (PID: 7212)
    • Reads the machine GUID from the registry

      • $RLIKEJQ.exe (PID: 7248)
    • PyInstaller has been detected (YARA)

      • $RLIKEJQ.exe (PID: 7212)
      • $RLIKEJQ.exe (PID: 7248)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:24 13:55:08+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce30
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start $rlikejq.exe $rlikejq.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7212"C:\Users\admin\AppData\Local\Temp\$RLIKEJQ.exe" C:\Users\admin\AppData\Local\Temp\$RLIKEJQ.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\$rlikejq.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7248"C:\Users\admin\AppData\Local\Temp\$RLIKEJQ.exe" C:\Users\admin\AppData\Local\Temp\$RLIKEJQ.exe$RLIKEJQ.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\$rlikejq.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
197
Read events
197
Write events
0
Delete events
0

Modification events

No data
Executable files
58
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\_lzma.pydexecutable
MD5:A77C9A75ED7D9F455E896B8FB09B494C
SHA256:4797AAF192EB56B32CA4FEBD1FAD5BE9E01A24E42BF6AF2D04FCDF74C8D36FA5
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\_asyncio.pydexecutable
MD5:3510357B9885A59B08FA557E3BAED3CE
SHA256:3AD5F4BD4361DF0C077122A91D180DCF9B68B0249FC6B39EDDA5DD4ECE6F23F1
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\_decimal.pydexecutable
MD5:BB70FC3EB76B6801ED7228B6869017B2
SHA256:831E4CE99F469FA94567482444AF492891B7BF327853E92DD4BB2CE092021E74
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\_hashlib.pydexecutable
MD5:AE32A39887D7516223C1E7FFDC3B6911
SHA256:7936413BC24307F01B90CAC2D2CC19F38264D396C1AB8EDA180ABBA2F77162EB
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\VCRUNTIME140.dllexecutable
MD5:11D9AC94E8CB17BD23DEA89F8E757F18
SHA256:E1D6F78A72836EA120BD27A33AE89CBDC3F3CA7D9D0231AAA3AAC91996D2FA4E
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\_ctypes.pydexecutable
MD5:7AB242D7C026DAD5E5837B4579BD4EDA
SHA256:1548506345D220D68E9089B9A68B42A9D796141EB6236E600283951CB206EAA1
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:557405C47613DE66B111D0E2B01F2FDB
SHA256:913EAAA7997A6AEE53574CFFB83F9C9C1700B1D8B46744A5E12D76A1E53376FD
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:D1DF480505F2D23C0B5C53DF2E0E2A1A
SHA256:0B3DFB8554EAD94D5DA7859A12DB353942406F9D1DFE3FAC3D48663C233EA99D
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:624401F31A706B1AE2245EB19264DC7F
SHA256:58A8D69DF60ECBEE776CD9A74B2A32B14BF2B0BD92D527EC5F19502A0D3EB8E9
7212$RLIKEJQ.exeC:\Users\admin\AppData\Local\Temp\_MEI72122\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:0F7D418C05128246AFA335A1FB400CB9
SHA256:5C9BC70586AD538B0DF1FCF5D6F1F3527450AE16935AA34BD7EB494B4F1B2DB9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.15:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7828
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7828
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6708
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.15:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.15
  • 23.216.77.21
  • 23.216.77.20
  • 23.216.77.17
  • 23.216.77.22
  • 23.216.77.31
  • 23.216.77.29
  • 23.216.77.27
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.73
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.0
  • 20.190.159.75
  • 40.126.31.129
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info