| File name: | superk.exe |
| Full analysis: | https://app.any.run/tasks/efd781b4-9190-4e59-9fa8-208e35aa89b9 |
| Verdict: | Malicious activity |
| Analysis date: | April 29, 2025, 05:25:20 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | CB71D22890C33D1D43016A035247362C |
| SHA1: | 93B5A097458EAF555CBA4FE1A6D17E55D8C5AAF5 |
| SHA256: | 1AA8BA684DF5B071C05C062A9FEBD2498722ECDCE39B4A5A3D8245D2540372E4 |
| SSDEEP: | 393216:7M3E0lFeRKSGUHGTy4aPhfq+U0MB/ElEbnq:4IKSGbap3UFB/E6 |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:04:17 15:48:11+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.43 |
| CodeSize: | 173568 |
| InitializedDataSize: | 155648 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xce30 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1672 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2236 | "C:\Users\admin\AppData\Local\Temp\superk.exe" | C:\Users\admin\AppData\Local\Temp\superk.exe | — | superk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6988 | "C:\Users\admin\AppData\Local\Temp\superk.exe" | C:\Users\admin\AppData\Local\Temp\superk.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2236) superk.exe | Key: | HKEY_CURRENT_USER\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_0627&PID_0001\Calibration\0 |
| Operation: | write | Name: | GUID |
Value: 3046F261BA24F0118001444553540000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_image.dll | executable | |
MD5:B8D249A5E394B4E6A954C557AF1B80E6 | SHA256:1E364AF75FEE0C83506FBDFD4D5B0E386C4E9C6A33DDBDDAC61DDB131E360194 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_mixer.dll | executable | |
MD5:201AA86DC9349396B83EED4C15ABE764 | SHA256:2A0FC5E9F72C2EAEC3240CB82B7594A58CCDA609485981F256B94D0A4DD8D6F8 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2.dll | executable | |
MD5:83C5FF24EAE3B9038D74AD91DC884E32 | SHA256:520D0459B91EFA32FBCCF9027A9CA1FC5AAE657E679CE8E90F179F9CF5AFD279 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\_socket.pyd | executable | |
MD5:ABF998769F3CBA685E90FA06E0EC8326 | SHA256:62D0493CED6CA33E2FD8141649DD9889C23B2E9AFC5FDF56EDB4F888C88FB823 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\SDL2_ttf.dll | executable | |
MD5:F187DFDCCC102436E27704DC572A2C16 | SHA256:FCDFABDFCE868EB33F7514025FF59C1BB6C418F1BCD6ACE2300A9CD4053E1D63 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\VCRUNTIME140_1.dll | executable | |
MD5:68156F41AE9A04D89BB6625A5CD222D4 | SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\VCRUNTIME140.dll | executable | |
MD5:862F820C3251E4CA6FC0AC00E4092239 | SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\_bz2.pyd | executable | |
MD5:C17DCB7FC227601471A641EC90E6237F | SHA256:55894B2B98D01F37B9A8CF4DAF926D0161FF23C2FB31C56F9DBBAC3A61932712 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\_ctypes.pyd | executable | |
MD5:2BD5DABBB35398A506E3406BC01EBA26 | SHA256:5C4C489AC052795C27AF063C96BC4DB5AB250144D4839050CFA9BB3836B87C32 | |||
| 6988 | superk.exe | C:\Users\admin\AppData\Local\Temp\_MEI69882\_multiprocessing.pyd | executable | |
MD5:22D20BD3946419ECF0882315AE1F96DE | SHA256:9DA721822A592F8C4E9A96EBAA4517C45768D7737582E0E5B933066F453A2E5E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5868 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5868 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 40.126.32.74:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |