File name:

AbiHesap.exe

Full analysis: https://app.any.run/tasks/f876e4f6-5cd8-4eea-a78b-9598b21636e0
Verdict: Malicious activity
Analysis date: April 18, 2025, 12:28:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

FE66AC54C847B7B036E8E46AF6E81BA7

SHA1:

5139FA4E5715A2BDE2F0ACC094D15955334572B1

SHA256:

195986D466C046C97F524DC67269DB0A4F4172B7EC2A83310DB31F10DAD2C09B

SSDEEP:

98304:TdJ5MYL9m/LZl7dukTHDauUk/o5QgSZ1Um7KunZM9HwGBWJFZSy9l57OaYDIA5zm:w2u9y0l1x6mDYtSXBrwd0jZS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • AbiHesap.exe (PID: 4108)
      • AbiHesap.exe (PID: 4812)
    • Application launched itself

      • AbiHesap.exe (PID: 4108)
    • Starts CMD.EXE for commands execution

      • AbiHesap.exe (PID: 4812)
    • The process drops C-runtime libraries

      • AbiHesap.exe (PID: 4108)
    • Process drops python dynamic module

      • AbiHesap.exe (PID: 4108)
    • Process drops legitimate windows executable

      • AbiHesap.exe (PID: 4108)
    • Loads Python modules

      • AbiHesap.exe (PID: 4812)
  • INFO

    • Reads the computer name

      • AbiHesap.exe (PID: 4108)
      • AbiHesap.exe (PID: 4812)
    • Checks supported languages

      • AbiHesap.exe (PID: 4108)
      • AbiHesap.exe (PID: 4812)
    • Create files in a temporary directory

      • AbiHesap.exe (PID: 4108)
      • AbiHesap.exe (PID: 4812)
    • The sample compiled with english language support

      • AbiHesap.exe (PID: 4108)
    • Creates files or folders in the user directory

      • AbiHesap.exe (PID: 4812)
    • Checks proxy server information

      • AbiHesap.exe (PID: 4812)
      • slui.exe (PID: 6272)
    • PyInstaller has been detected (YARA)

      • AbiHesap.exe (PID: 4812)
      • AbiHesap.exe (PID: 4108)
    • Reads the machine GUID from the registry

      • AbiHesap.exe (PID: 4812)
    • Reads the software policy settings

      • slui.exe (PID: 6640)
      • slui.exe (PID: 6272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:07:12 13:34:08+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.32
CodeSize: 165888
InitializedDataSize: 199168
UninitializedDataSize: -
EntryPoint: 0xa330
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start abihesap.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe abihesap.exe cmd.exe no specs cmd.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1072C:\WINDOWS\system32\cmd.exe /c clsC:\Windows\System32\cmd.exeAbiHesap.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1280\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeAbiHesap.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1452C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4108"C:\Users\admin\AppData\Local\Temp\AbiHesap.exe" C:\Users\admin\AppData\Local\Temp\AbiHesap.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\abihesap.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4812"C:\Users\admin\AppData\Local\Temp\AbiHesap.exe" C:\Users\admin\AppData\Local\Temp\AbiHesap.exe
AbiHesap.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\abihesap.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6272C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6640"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7148C:\WINDOWS\system32\cmd.exe /c @echo offC:\Windows\System32\cmd.exeAbiHesap.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 215
Read events
4 215
Write events
0
Delete events
0

Modification events

No data
Executable files
77
Suspicious files
9
Text files
38
Unknown types
0

Dropped files

PID
Process
Filename
Type
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_ARC4.pydexecutable
MD5:B8CE6246C867FA4D9A97C8C0ABD86162
SHA256:3BFCEEF9B2A31336876A2A6BE63891FDA68BA30AC37EFCB94A4CED10A6E6C23D
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_chacha20.pydexecutable
MD5:5CAD133D9824EBFAAAF6C23FD7117775
SHA256:B80E579CEB9902DE24B6B0794D9169B0248C01FD539003F21E92655920EBA461
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_raw_aes.pydexecutable
MD5:ABBE9B2424566E107CB05D0DDA0AA636
SHA256:C438DD66FA669430CCE11B2ACB7DC0EE72B7953B07013FDA6BF6B803C2C961F9
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_pkcs1_decode.pydexecutable
MD5:2C138D64B80F7C42123CCD0F03C30D30
SHA256:C3C09625B79A279EDA4907085FC15239DB14BE8E54B38D1FE9FA28F3DE29F2D8
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_raw_arc2.pydexecutable
MD5:9CE1EC6C375848D729C99AA19B04AC4A
SHA256:119ED08B30A011FB067BE66BAD5CA7BE9910632583AB0C723ED770A38DD99212
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_Salsa20.pydexecutable
MD5:E598D24941E68620AEF43723B239E1C5
SHA256:E63D4123D894B61E0242D53813307FA1FF3B7B60818827520F7FF20CABCD8904
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_raw_cast.pydexecutable
MD5:92FE77E205F6DB73E0676081E95340B0
SHA256:46BA53DEB7E77D5BD5A384ACDF5BFB01814892236F98390EC9A6717F98760CFE
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_raw_ctr.pydexecutable
MD5:A33AC93007AB673CB2780074D30F03BD
SHA256:4452CF380A07919B87F39BC60768BCC4187B6910B24869DBD066F2149E04DE47
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_raw_des.pydexecutable
MD5:5C00ABB4D517014A648CE8EEE328FB9A
SHA256:C95B92EE95EF383C57CB99C2391ECCD273D38CF852125C3300BD7563EE0D160F
4108AbiHesap.exeC:\Users\admin\AppData\Local\Temp\_MEI41082\Crypto\Cipher\_raw_cfb.pydexecutable
MD5:FE489576D8950611C13E6CD1D682BC3D
SHA256:BB79A502ECA26D3418B49A47050FB4015FDB24BEE97CE56CDD070D0FCEB96CCD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
26
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5056
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5056
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4812
AbiHesap.exe
188.114.96.3:443
sunucu.abihesap.com
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
google.com
  • 142.250.186.142
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.73
  • 40.126.31.131
  • 20.190.159.64
  • 20.190.159.4
  • 40.126.31.0
  • 40.126.31.129
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
sunucu.abihesap.com
  • 188.114.96.3
  • 188.114.97.3
unknown
chromedriver.storage.googleapis.com
  • 172.217.16.155
  • 172.217.18.27
  • 216.58.206.91
  • 172.217.23.123
  • 216.58.212.155
  • 142.250.185.91
  • 142.250.186.91
  • 142.250.186.59
  • 142.250.185.187
  • 142.250.185.219
  • 142.250.185.251
  • 142.250.181.251
  • 216.58.206.59
  • 172.217.16.219
  • 142.250.185.155
  • 142.250.185.123
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info