| File name: | FuckNiga1.exe |
| Full analysis: | https://app.any.run/tasks/12310a07-990a-4d6d-b913-23b741e30e75 |
| Verdict: | Malicious activity |
| Analysis date: | March 25, 2025, 06:02:02 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 6 sections |
| MD5: | 7B8D9A0CAA9E7F30965F36CDB11C53BA |
| SHA1: | 8694DAB6B2D163C227133CE72B6D4EA67C3BE761 |
| SHA256: | 2082FB5DC6DED791901A71BCB9DA9EFABA3AF4CB16B96B53A764D1FDA49A2FA0 |
| SSDEEP: | 98304:eVIyDmgGmSyu4YJbebWn7CvlfaMh3pmV4CseEesQHc/kHqqHmRdoiLhrc0W6lpht:2OglOkmPf |
| .exe | | | InstallShield setup (57.6) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (36.9) |
| .exe | | | Generic Win/DOS Executable (2.6) |
| .exe | | | DOS Executable Generic (2.6) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:03:25 05:36:31+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.4 |
| CodeSize: | 176640 |
| InitializedDataSize: | 152576 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc320 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 672 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=6372" "pipe_handle=408" | C:\Users\admin\Desktop\FuckNiga1.exe | FuckNiga1.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 904 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=6148" "pipe_handle=372" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 960 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=5892" "pipe_handle=368" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1040 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=6676" "pipe_handle=372" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1056 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=2108" "pipe_handle=392" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1184 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=1056" "pipe_handle=504" | C:\Users\admin\Desktop\FuckNiga1.exe | FuckNiga1.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1240 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=1040" "pipe_handle=536" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1276 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=2384" "pipe_handle=276" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1324 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=3884" "pipe_handle=376" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1764 | "C:\Users\admin\Desktop\FuckNiga1.exe" "--multiprocessing-fork" "parent_pid=4812" "pipe_handle=380" | C:\Users\admin\Desktop\FuckNiga1.exe | — | FuckNiga1.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\_bz2.pyd | executable | |
MD5:DD26ED92888DE9C57660A7AD631BB916 | SHA256:324268786921EC940CBD4B5E2F71DAFD08E578A12E373A715658527E5B211697 | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\libssl-3.dll | executable | |
MD5:19A2ABA25456181D5FB572D88AC0E73E | SHA256:2E9FBCD8F7FDC13A5179533239811456554F2B3AA2FB10E1B17BE0DF81C79006 | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\libcrypto-3.dll | executable | |
MD5:E547CF6D296A88F5B1C352C116DF7C0C | SHA256:05FE080EAB7FC535C51E10C1BD76A2F3E6217F9C91A25034774588881C3F99DE | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\base_library.zip | compressed | |
MD5:763D1A751C5D47212FBF0CAEA63F46F5 | SHA256:378A4B40F4FA4A8229C93E0AFEE819085251AF03402CCEFA3B469651E50E60B7 | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\unicodedata.pyd | executable | |
MD5:B848E259FABAF32B4B3C980A0A12488D | SHA256:C65073B65F107E471C9BE3C699FB11F774E9A07581F41229582F7B2154B6FC3C | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\_ctypes.pyd | executable | |
MD5:C8AFA1EBB28828E1115C110313D2A810 | SHA256:8978972CF341CCD0EDF8435D63909A739DF7EF29EC7DD57ED5CAB64B342891F0 | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\libffi-8.dll | executable | |
MD5:0F8E4992CA92BAAF54CC0B43AACCCE21 | SHA256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A | |||
| 4040 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Temp\_MEI40402\select.pyd | executable | |
MD5:79CE1AE3A23DFF6ED5FC66E6416600CD | SHA256:678E09AD44BE42FA9BC9C7A18C25DBE995A59B6C36A13EECC09C0F02A647B6F0 | |||
| 1184 | FuckNiga1.exe | C:\ProgramData\Adobe\ARM\S\388\AdobeARMHelper.exe.txt | executable | |
MD5:6280AC1831E499B972405890FFF0B5AF | SHA256:1650105226B7E52E26E98A467BA83F58333F9BB72EA2274B2ABABE598AEF8D65 | |||
| 1184 | FuckNiga1.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Speech Recognition\1.15.0.1\Microsoft.CognitiveServices.Speech.core.dll.txt | executable | |
MD5:0EE2B50C85A110689352FCCFA77B5B18 | SHA256:62A13D8459E0992C311DC3551BF3C2D1CE167EA7FA40F0EC62193F3BD760B36E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.16.164.72:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 2.16.164.72:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6964 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8792 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |