File name:

msedge_elf.dll

Full analysis: https://app.any.run/tasks/f91789f5-ec5d-46ef-81d7-8c7af3056f5b
Verdict: Malicious activity
Analysis date: May 31, 2025, 07:26:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
auto
generic
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
MD5:

734207BAA098329691F3AC8568DF2984

SHA1:

88252B7C7E2B1D87B5FC71DF938196292267C5FC

SHA256:

21E4AD5EC1CBD70C47B33162600B09388714523EA3A0298471D3EB030C61218E

SSDEEP:

98304:oX4JndkojM6FpJTItqfxOIRRTifp/VQc5c13Xf51rwxeT+fGUGDLWX8rjsdJkkwO:LHmUHlKF6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • rundll32.exe (PID: 6988)
      • side.exe (PID: 1168)
    • Executing a file with an untrusted certificate

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 6988)
      • side.exe (PID: 1168)
    • The process drops C-runtime libraries

      • side.exe (PID: 1168)
    • Process drops legitimate windows executable

      • side.exe (PID: 1168)
    • Process drops python dynamic module

      • side.exe (PID: 1168)
    • Application launched itself

      • side.exe (PID: 1168)
    • Loads Python modules

      • side.exe (PID: 8012)
    • Connects to unusual port

      • side.exe (PID: 8012)
    • There is functionality for taking screenshot (YARA)

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
  • INFO

    • Checks supported languages

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • Reads the computer name

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • Create files in a temporary directory

      • side.exe (PID: 1168)
      • rundll32.exe (PID: 6988)
    • The sample compiled with english language support

      • side.exe (PID: 1168)
    • Reads the machine GUID from the registry

      • side.exe (PID: 8012)
    • PyInstaller has been detected (YARA)

      • side.exe (PID: 1168)
      • side.exe (PID: 8012)
    • Reads the software policy settings

      • slui.exe (PID: 7376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:26 04:26:44+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 685568
InitializedDataSize: 4627456
UninitializedDataSize: -
EntryPoint: 0x4e4c4
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GENERIC rundll32.exe #GENERIC side.exe side.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1168"C:\Users\admin\AppData\Local\Temp\\side.exe"C:\Users\admin\AppData\Local\Temp\side.exe
rundll32.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\side.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1568C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6988"C:\WINDOWS\System32\rundll32.exe" C:\Users\admin\AppData\Local\Temp\msedge_elf.dll, #1C:\Windows\System32\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7376"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7656C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8012"C:\Users\admin\AppData\Local\Temp\\side.exe"C:\Users\admin\AppData\Local\Temp\side.exe
side.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\side.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
Total events
785
Read events
785
Write events
0
Delete events
0

Modification events

No data
Executable files
13
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_hashlib.pydexecutable
MD5:E84E1BA269371E439C2D52024ACA6535
SHA256:2FCB297733E6080480AC24CF073FF5E239FB02A1CE9694313C5047F9C58D781B
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\VCRUNTIME140.dllexecutable
MD5:AE96651CFBD18991D186A029CBECB30C
SHA256:1B372F064EACB455A0351863706E6326CA31B08E779A70DE5DE986B5BE8069A1
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_socket.pydexecutable
MD5:A4BD8E0C0597A22C3F0601FE798668AA
SHA256:96B0A3CFC16E215F0EF5D1E206F0137B4255005052720E91A58BC98CDE8C898E
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_lzma.pydexecutable
MD5:65880A33015AF2030A08987924CA737B
SHA256:A71366B95D89D1539A6EE751D48A969C1BCA1AA75116424CC5F905F32A625EEA
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\python37.dllexecutable
MD5:D49EAC0FAA510F2B2A8934A0F4E4A46F
SHA256:625CA7BB2D34A3986F77C0C5CE572A08FEBFCACF5050A986507E822FF694DCAA
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\libssl-1_1.dllexecutable
MD5:5ADB49CC84ABD6D3C8F959CA5A146AD7
SHA256:F4D5DF50BDF3E7304C67C81ACE83263C8D0F0E28087C6104C21150BFEDA86B8D
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\select.pydexecutable
MD5:6A796088CD3D1B1D6590364B9372959D
SHA256:74D8E6A57090BA32CF7C82AD9A275351E421842D6EC94C44ADBBA629B1893FA7
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_ssl.pydexecutable
MD5:CC5C8EB32ACB2261C42A7285D436CCA9
SHA256:07EA50E536886F68473635FFEFCFCAA7266E63C478EF039BA100DDF02F88CE61
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\_bz2.pydexecutable
MD5:FF5AC8FB724EDB1635E2AD985F98EE5B
SHA256:B94F64FCB49F40682ED794FA1940A1DC0C8A28F24A1768D3BFE774CF75F59B62
1168side.exeC:\Users\admin\AppData\Local\Temp\_MEI11682\unicodedata.pydexecutable
MD5:E176F984D22F031098D700B7F1892378
SHA256:46876FC52F1529C2633372D8E2CEA5B08B5A8582F8645CFAD8F5FF8128A7F575
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7496
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7496
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
8012
side.exe
185.170.154.197:7645
Node4 Limited
GB
malicious
4
System
192.168.100.255:138
whitelisted
7964
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.74
  • 40.126.32.140
  • 20.190.160.5
  • 20.190.160.130
  • 40.126.32.138
  • 20.190.160.65
  • 20.190.159.71
  • 40.126.31.128
  • 40.126.31.130
  • 40.126.31.131
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.131
  • 40.126.31.1
whitelisted
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 23.219.150.101
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info