File name:

msedge_elf.dll

Full analysis: https://app.any.run/tasks/f91789f5-ec5d-46ef-81d7-8c7af3056f5b
Verdict: Malicious activity
Analysis date: May 31, 2025, 07:26:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
auto
generic
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
MD5:

734207BAA098329691F3AC8568DF2984

SHA1:

88252B7C7E2B1D87B5FC71DF938196292267C5FC

SHA256:

21E4AD5EC1CBD70C47B33162600B09388714523EA3A0298471D3EB030C61218E

SSDEEP:

98304:oX4JndkojM6FpJTItqfxOIRRTifp/VQc5c13Xf51rwxeT+fGUGDLWX8rjsdJkkwO:LHmUHlKF6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • GENERIC has been found (auto)

      • rundll32.exe (PID: 6988)
      • side.exe (PID: 1168)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 6988)
      • side.exe (PID: 1168)
    • Process drops legitimate windows executable

      • side.exe (PID: 1168)
    • Process drops python dynamic module

      • side.exe (PID: 1168)
    • The process drops C-runtime libraries

      • side.exe (PID: 1168)
    • Application launched itself

      • side.exe (PID: 1168)
    • There is functionality for taking screenshot (YARA)

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • Loads Python modules

      • side.exe (PID: 8012)
    • Connects to unusual port

      • side.exe (PID: 8012)
  • INFO

    • Create files in a temporary directory

      • rundll32.exe (PID: 6988)
      • side.exe (PID: 1168)
    • Reads the computer name

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • Checks supported languages

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • The sample compiled with english language support

      • side.exe (PID: 1168)
    • PyInstaller has been detected (YARA)

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • Reads the machine GUID from the registry

      • side.exe (PID: 8012)
    • Reads the software policy settings

      • slui.exe (PID: 7376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:26 04:26:44+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 685568
InitializedDataSize: 4627456
UninitializedDataSize: -
EntryPoint: 0x4e4c4
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GENERIC rundll32.exe #GENERIC side.exe side.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1168"C:\Users\admin\AppData\Local\Temp\\side.exe"C:\Users\admin\AppData\Local\Temp\side.exe
rundll32.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\side.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1568C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6988"C:\WINDOWS\System32\rundll32.exe" C:\Users\admin\AppData\Local\Temp\msedge_elf.dll, #1C:\Windows\System32\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7376"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7656C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8012"C:\Users\admin\AppData\Local\Temp\\side.exe"C:\Users\admin\AppData\Local\Temp\side.exe
side.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\side.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
Total events
785
Read events
785
Write events
0
Delete events
0

Modification events

No data
Executable files
13
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_bz2.pydexecutable
MD5:FF5AC8FB724EDB1635E2AD985F98EE5B
SHA256:B94F64FCB49F40682ED794FA1940A1DC0C8A28F24A1768D3BFE774CF75F59B62
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\VCRUNTIME140.dllexecutable
MD5:AE96651CFBD18991D186A029CBECB30C
SHA256:1B372F064EACB455A0351863706E6326CA31B08E779A70DE5DE986B5BE8069A1
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_hashlib.pydexecutable
MD5:E84E1BA269371E439C2D52024ACA6535
SHA256:2FCB297733E6080480AC24CF073FF5E239FB02A1CE9694313C5047F9C58D781B
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_socket.pydexecutable
MD5:A4BD8E0C0597A22C3F0601FE798668AA
SHA256:96B0A3CFC16E215F0EF5D1E206F0137B4255005052720E91A58BC98CDE8C898E
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\unicodedata.pydexecutable
MD5:E176F984D22F031098D700B7F1892378
SHA256:46876FC52F1529C2633372D8E2CEA5B08B5A8582F8645CFAD8F5FF8128A7F575
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\base_library.zipcompressed
MD5:B52243EB8C34C86EEB1ED2EAE312E0EB
SHA256:7A69525A45F694AFE862610F42D692C3E6540DCEE656A0997EA6970EEB0C75EB
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\libssl-1_1.dllexecutable
MD5:5ADB49CC84ABD6D3C8F959CA5A146AD7
SHA256:F4D5DF50BDF3E7304C67C81ACE83263C8D0F0E28087C6104C21150BFEDA86B8D
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\tinyaes.cp37-win32.pydexecutable
MD5:2EE4A5453D610134BE563564E0D832FA
SHA256:EDACA59C7081DD3355AD53830ED2153EB905EB72FF96750695DF51C7C508A957
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\libcrypto-1_1.dllexecutable
MD5:C0E55A25DD5C5447F15EED0CA6552AB7
SHA256:9FEFBA93FA3300732B7E68FB3B4DBB57BF2726889772A1D0D6694A71820D71F3
6988rundll32.exeC:\Users\admin\AppData\Local\Temp\side.exeexecutable
MD5:5C39420363460DC4E1ED830666F679D1
SHA256:248A36071B83F7F98F8F87EED5BEFF1F4828EAA065B7A1FE63F0A525CB46AC88
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7496
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7496
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
8012
side.exe
185.170.154.197:7645
Node4 Limited
GB
malicious
4
System
192.168.100.255:138
whitelisted
7964
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.74
  • 40.126.32.140
  • 20.190.160.5
  • 20.190.160.130
  • 40.126.32.138
  • 20.190.160.65
  • 20.190.159.71
  • 40.126.31.128
  • 40.126.31.130
  • 40.126.31.131
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.131
  • 40.126.31.1
whitelisted
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 23.219.150.101
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info