File name:

superk.exe

Full analysis: https://app.any.run/tasks/efd781b4-9190-4e59-9fa8-208e35aa89b9
Verdict: Malicious activity
Analysis date: April 29, 2025, 05:25:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

CB71D22890C33D1D43016A035247362C

SHA1:

93B5A097458EAF555CBA4FE1A6D17E55D8C5AAF5

SHA256:

1AA8BA684DF5B071C05C062A9FEBD2498722ECDCE39B4A5A3D8245D2540372E4

SSDEEP:

393216:7M3E0lFeRKSGUHGTy4aPhfq+U0MB/ElEbnq:4IKSGbap3UFB/E6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • superk.exe (PID: 6988)
    • Process drops python dynamic module

      • superk.exe (PID: 6988)
    • Loads Python modules

      • superk.exe (PID: 2236)
    • Process drops legitimate windows executable

      • superk.exe (PID: 6988)
    • The process drops C-runtime libraries

      • superk.exe (PID: 6988)
    • Application launched itself

      • superk.exe (PID: 6988)
    • There is functionality for taking screenshot (YARA)

      • superk.exe (PID: 6988)
  • INFO

    • Checks supported languages

      • superk.exe (PID: 2236)
      • superk.exe (PID: 6988)
    • Create files in a temporary directory

      • superk.exe (PID: 6988)
    • Reads the computer name

      • superk.exe (PID: 6988)
      • superk.exe (PID: 2236)
    • The sample compiled with english language support

      • superk.exe (PID: 6988)
    • Reads mouse settings

      • superk.exe (PID: 2236)
    • PyInstaller has been detected (YARA)

      • superk.exe (PID: 6988)
    • Checks proxy server information

      • slui.exe (PID: 1672)
    • Reads the software policy settings

      • slui.exe (PID: 1672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:17 15:48:11+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce30
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start superk.exe superk.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1672C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2236"C:\Users\admin\AppData\Local\Temp\superk.exe" C:\Users\admin\AppData\Local\Temp\superk.exesuperk.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\superk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6988"C:\Users\admin\AppData\Local\Temp\superk.exe" C:\Users\admin\AppData\Local\Temp\superk.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\superk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
759
Read events
758
Write events
1
Delete events
0

Modification events

(PID) Process:(2236) superk.exeKey:HKEY_CURRENT_USER\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_0627&PID_0001\Calibration\0
Operation:writeName:GUID
Value:
3046F261BA24F0118001444553540000
Executable files
91
Suspicious files
7
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_image.dllexecutable
MD5:B8D249A5E394B4E6A954C557AF1B80E6
SHA256:1E364AF75FEE0C83506FBDFD4D5B0E386C4E9C6A33DDBDDAC61DDB131E360194
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_mixer.dllexecutable
MD5:201AA86DC9349396B83EED4C15ABE764
SHA256:2A0FC5E9F72C2EAEC3240CB82B7594A58CCDA609485981F256B94D0A4DD8D6F8
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2.dllexecutable
MD5:83C5FF24EAE3B9038D74AD91DC884E32
SHA256:520D0459B91EFA32FBCCF9027A9CA1FC5AAE657E679CE8E90F179F9CF5AFD279
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_socket.pydexecutable
MD5:ABF998769F3CBA685E90FA06E0EC8326
SHA256:62D0493CED6CA33E2FD8141649DD9889C23B2E9AFC5FDF56EDB4F888C88FB823
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_ttf.dllexecutable
MD5:F187DFDCCC102436E27704DC572A2C16
SHA256:FCDFABDFCE868EB33F7514025FF59C1BB6C418F1BCD6ACE2300A9CD4053E1D63
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\VCRUNTIME140_1.dllexecutable
MD5:68156F41AE9A04D89BB6625A5CD222D4
SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_bz2.pydexecutable
MD5:C17DCB7FC227601471A641EC90E6237F
SHA256:55894B2B98D01F37B9A8CF4DAF926D0161FF23C2FB31C56F9DBBAC3A61932712
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_ctypes.pydexecutable
MD5:2BD5DABBB35398A506E3406BC01EBA26
SHA256:5C4C489AC052795C27AF063C96BC4DB5AB250144D4839050CFA9BB3836B87C32
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_multiprocessing.pydexecutable
MD5:22D20BD3946419ECF0882315AE1F96DE
SHA256:9DA721822A592F8C4E9A96EBAA4517C45768D7737582E0E5B933066F453A2E5E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5868
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5868
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.20
  • 20.190.160.66
  • 20.190.160.128
  • 40.126.32.134
  • 20.190.160.5
  • 40.126.32.72
  • 20.190.160.3
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info