File name:

superk.exe

Full analysis: https://app.any.run/tasks/efd781b4-9190-4e59-9fa8-208e35aa89b9
Verdict: Malicious activity
Analysis date: April 29, 2025, 05:25:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

CB71D22890C33D1D43016A035247362C

SHA1:

93B5A097458EAF555CBA4FE1A6D17E55D8C5AAF5

SHA256:

1AA8BA684DF5B071C05C062A9FEBD2498722ECDCE39B4A5A3D8245D2540372E4

SSDEEP:

393216:7M3E0lFeRKSGUHGTy4aPhfq+U0MB/ElEbnq:4IKSGbap3UFB/E6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • superk.exe (PID: 6988)
    • The process drops C-runtime libraries

      • superk.exe (PID: 6988)
    • Process drops python dynamic module

      • superk.exe (PID: 6988)
    • Executable content was dropped or overwritten

      • superk.exe (PID: 6988)
    • Application launched itself

      • superk.exe (PID: 6988)
    • Loads Python modules

      • superk.exe (PID: 2236)
    • There is functionality for taking screenshot (YARA)

      • superk.exe (PID: 6988)
  • INFO

    • Reads the computer name

      • superk.exe (PID: 6988)
      • superk.exe (PID: 2236)
    • Checks supported languages

      • superk.exe (PID: 6988)
      • superk.exe (PID: 2236)
    • The sample compiled with english language support

      • superk.exe (PID: 6988)
    • Create files in a temporary directory

      • superk.exe (PID: 6988)
    • Reads mouse settings

      • superk.exe (PID: 2236)
    • PyInstaller has been detected (YARA)

      • superk.exe (PID: 6988)
    • Reads the software policy settings

      • slui.exe (PID: 1672)
    • Checks proxy server information

      • slui.exe (PID: 1672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:17 15:48:11+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce30
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start superk.exe superk.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1672C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2236"C:\Users\admin\AppData\Local\Temp\superk.exe" C:\Users\admin\AppData\Local\Temp\superk.exesuperk.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\superk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6988"C:\Users\admin\AppData\Local\Temp\superk.exe" C:\Users\admin\AppData\Local\Temp\superk.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\superk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
759
Read events
758
Write events
1
Delete events
0

Modification events

(PID) Process:(2236) superk.exeKey:HKEY_CURRENT_USER\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_0627&PID_0001\Calibration\0
Operation:writeName:GUID
Value:
3046F261BA24F0118001444553540000
Executable files
91
Suspicious files
7
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2.dllexecutable
MD5:83C5FF24EAE3B9038D74AD91DC884E32
SHA256:520D0459B91EFA32FBCCF9027A9CA1FC5AAE657E679CE8E90F179F9CF5AFD279
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_image.dllexecutable
MD5:B8D249A5E394B4E6A954C557AF1B80E6
SHA256:1E364AF75FEE0C83506FBDFD4D5B0E386C4E9C6A33DDBDDAC61DDB131E360194
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_multiprocessing.pydexecutable
MD5:22D20BD3946419ECF0882315AE1F96DE
SHA256:9DA721822A592F8C4E9A96EBAA4517C45768D7737582E0E5B933066F453A2E5E
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\alien.pngimage
MD5:4BA7ED933EDB7B46E851FD0E88F89167
SHA256:BA0D4758CFF878B2D30E50E16E25913CC6462F77AA3C1CA85D84B5438160B0E5
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_overlapped.pydexecutable
MD5:4DF3728D404E0B1607A80B32C6C93BCC
SHA256:C8A0E2C0D7F82CEDB839D2C0B827CF139113FAA4ABA05F2345C80E2CF3335B8A
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_asyncio.pydexecutable
MD5:142E957AE9FE9DD8514E1781C9A35C2B
SHA256:4C6D6690E91974804C1EAF77827EA63882711689BAFF0718A246796FF40B2A23
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_mixer.dllexecutable
MD5:201AA86DC9349396B83EED4C15ABE764
SHA256:2A0FC5E9F72C2EAEC3240CB82B7594A58CCDA609485981F256B94D0A4DD8D6F8
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_decimal.pydexecutable
MD5:AD4324E5CC794D626FFCCDA544A5A833
SHA256:040F361F63204B55C17A100C260C7DDFADD00866CC055FBD641B83A6747547D5
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_bz2.pydexecutable
MD5:C17DCB7FC227601471A641EC90E6237F
SHA256:55894B2B98D01F37B9A8CF4DAF926D0161FF23C2FB31C56F9DBBAC3A61932712
6988superk.exeC:\Users\admin\AppData\Local\Temp\_MEI69882\_ctypes.pydexecutable
MD5:2BD5DABBB35398A506E3406BC01EBA26
SHA256:5C4C489AC052795C27AF063C96BC4DB5AB250144D4839050CFA9BB3836B87C32
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5868
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5868
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.20
  • 20.190.160.66
  • 20.190.160.128
  • 40.126.32.134
  • 20.190.160.5
  • 40.126.32.72
  • 20.190.160.3
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info