File name:

Installer.exe

Full analysis: https://app.any.run/tasks/26074e75-1d91-4fe9-925f-12cb8bab7c96
Verdict: Malicious activity
Threats:

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

Analysis date: May 10, 2025, 06:06:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
darkcomet
rat
antivm
delphi
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

BA7B877D1FF3EC8306406C7BE60EACFB

SHA1:

C844C37FA13E3D0F2B97A01F098F24D44EB309AF

SHA256:

18D11D4C837FB6BB2C6806318CB1510BA7FDC54ABE8E7A53C589FD12B3A02292

SSDEEP:

98304:ECYzBDvnSJj2+COESkvWgfbSb4Y6ZhkDQet54nHZUhOcz0dGElMTjtGRU6EQIeJx:Gxnj881mw2/kiS3V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DARKCOMET mutex has been found

      • tmpxr7je5nu.exe (PID: 7496)
    • DARKCOMET has been detected (YARA)

      • tmpxr7je5nu.exe (PID: 7496)
  • SUSPICIOUS

    • Application launched itself

      • Installer.exe (PID: 7368)
    • Loads Python modules

      • Installer.exe (PID: 7396)
    • Executable content was dropped or overwritten

      • Installer.exe (PID: 7396)
      • Installer.exe (PID: 7368)
    • Starts CMD.EXE for commands execution

      • Installer.exe (PID: 7396)
    • The executable file from the user directory is run by the CMD process

      • tmpxr7je5nu.exe (PID: 7496)
    • Connects to unusual port

      • tmpxr7je5nu.exe (PID: 7496)
    • There is functionality for communication over UDP network (YARA)

      • tmpxr7je5nu.exe (PID: 7496)
    • There is functionality for taking screenshot (YARA)

      • tmpxr7je5nu.exe (PID: 7496)
    • There is functionality for VM detection antiVM strings (YARA)

      • tmpxr7je5nu.exe (PID: 7496)
    • The process drops C-runtime libraries

      • Installer.exe (PID: 7368)
    • Process drops legitimate windows executable

      • Installer.exe (PID: 7368)
    • Process drops python dynamic module

      • Installer.exe (PID: 7368)
  • INFO

    • The sample compiled with english language support

      • Installer.exe (PID: 7368)
      • Installer.exe (PID: 7396)
    • Reads the computer name

      • Installer.exe (PID: 7368)
      • tmpxr7je5nu.exe (PID: 7496)
    • Checks supported languages

      • Installer.exe (PID: 7368)
      • tmpxr7je5nu.exe (PID: 7496)
      • Installer.exe (PID: 7396)
    • Create files in a temporary directory

      • Installer.exe (PID: 7396)
      • Installer.exe (PID: 7368)
    • Compiled with Borland Delphi (YARA)

      • tmpxr7je5nu.exe (PID: 7496)
    • UPX packer has been detected

      • tmpxr7je5nu.exe (PID: 7496)
    • Reads the software policy settings

      • slui.exe (PID: 7516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:09 00:39:00+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce30
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start installer.exe installer.exe cmd.exe no specs conhost.exe no specs sppextcomobj.exe no specs #DARKCOMET tmpxr7je5nu.exe slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7368"C:\Users\admin\AppData\Local\Temp\Installer.exe" C:\Users\admin\AppData\Local\Temp\Installer.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7396"C:\Users\admin\AppData\Local\Temp\Installer.exe" C:\Users\admin\AppData\Local\Temp\Installer.exe
Installer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7416C:\WINDOWS\system32\cmd.exe /c "C:\Users\admin\AppData\Local\Temp\tmpxr7je5nu.exe"C:\Windows\System32\cmd.exeInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
7424\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7468C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7496C:\Users\admin\AppData\Local\Temp\tmpxr7je5nu.exeC:\Users\admin\AppData\Local\Temp\tmpxr7je5nu.exe
cmd.exe
User:
admin
Company:
Microsoft Corp.
Integrity Level:
MEDIUM
Description:
Remote Service Application
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\tmpxr7je5nu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7516"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8132C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 019
Read events
1 019
Write events
0
Delete events
0

Modification events

No data
Executable files
11
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\_hashlib.pydexecutable
MD5:3E540EF568215561590DF215801B0F59
SHA256:52F29AEBE9886E830DEDC363CD64EB53B6830D84B26E14F1B6FAA655A0900B5D
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\_bz2.pydexecutable
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB
SHA256:449058EFC99FCCB9E24D640084D845C78F3F86DD34C5C126CF69E523D6320D75
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\_decimal.pydexecutable
MD5:21FCB8E3D4310346A5DC1A216E7E23CA
SHA256:4E27C06B84401039D10F800A0F06446B58508784EE366C7C8324D8FE9794E1A5
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\_socket.pydexecutable
MD5:566CB4D39B700C19DBD7175BD4F2B649
SHA256:BCED17D6F081D81EA7CD92F1E071E38F8840E61EE0FE1524221B776BCFA78650
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\libcrypto-3.dllexecutable
MD5:AE5B2E9A3410839B31938F24B6FC5CD8
SHA256:CCFFFDDCD3DEFB8D899026298AF9AF43BC186130F8483D77E97C93233D5F27D7
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\unicodedata.pydexecutable
MD5:503B3FFA6A5BF45AB34D6D74352F206B
SHA256:071494856FDAD0042964769AA2FB1DE4EA95C2CFCBE27CC7132293C68D13D710
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:052AD6A20D375957E82AA6A3C441EA548D89BE0981516CA7EB306E063D5027F4
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\base_library.zipcompressed
MD5:B04C0CF1B939B53A6B44B62550E8F4CF
SHA256:C96A0D4B537E821878F744A0A8C78CAA529965C0FEC3075856E56E42D73B7D50
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\python313.dllexecutable
MD5:7387FE038EA75EB9A57B054FCCFE37BF
SHA256:69FD86EA29370697C203F7E12830084F920F490766A8E3045AF52C036A9AD529
7368Installer.exeC:\Users\admin\AppData\Local\Temp\_MEI73682\_lzma.pydexecutable
MD5:D63E2E743EA103626D33B3C1D882F419
SHA256:48F16B587C6FAA44A9E073365B19599200B0F0A0CCB70121E76C2DAC4ED53281
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7948
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7948
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4784
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7496
tmpxr7je5nu.exe
162.250.188.82:1604
RICAWEBSERVICES
CA
unknown
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 216.58.212.174
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.130
  • 40.126.31.129
  • 20.190.159.0
  • 40.126.31.3
  • 40.126.31.67
  • 20.190.159.73
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info