URL:

https://www.gyan.dev/ffmpeg/builds/ffmpeg-git-essentials.7z

Full analysis: https://app.any.run/tasks/53df6568-fa1f-4bbb-b8b7-5fd441ee5b92
Verdict: Malicious activity
Analysis date: December 10, 2024, 18:01:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
crypto-regex
Indicators:
MD5:

D95620E948A180AFF9C25891023E6552

SHA1:

C7290D1746CE49FEB42E89003A1B6E88118069C1

SHA256:

30186161B2AB1F66D9F56F6A1B18E39B8392A6E548B40B61775F299242BB7DC5

SSDEEP:

3:N8DSL0ATuoKwIPVkf:2OLbgo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • yt-dlp.exe (PID: 6404)
    • Executable content was dropped or overwritten

      • yt-dlp.exe (PID: 6404)
    • Application launched itself

      • yt-dlp.exe (PID: 6404)
    • Process drops python dynamic module

      • yt-dlp.exe (PID: 6404)
    • The process drops C-runtime libraries

      • yt-dlp.exe (PID: 6404)
    • Starts CMD.EXE for commands execution

      • yt-dlp.exe (PID: 5748)
    • Loads Python modules

      • yt-dlp.exe (PID: 5748)
    • Found regular expressions for crypto-addresses (YARA)

      • yt-dlp.exe (PID: 5748)
  • INFO

    • The process uses the downloaded file

      • powershell.exe (PID: 6196)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 6196)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 6196)
    • Create files in a temporary directory

      • yt-dlp.exe (PID: 6404)
    • The sample compiled with english language support

      • yt-dlp.exe (PID: 6404)
    • Checks supported languages

      • yt-dlp.exe (PID: 5748)
      • ffmpeg.exe (PID: 7704)
    • Reads the machine GUID from the registry

      • yt-dlp.exe (PID: 5748)
    • Checks operating system version

      • yt-dlp.exe (PID: 5748)
    • Checks proxy server information

      • yt-dlp.exe (PID: 5748)
    • Reads the computer name

      • yt-dlp.exe (PID: 5748)
    • PyInstaller has been detected (YARA)

      • yt-dlp.exe (PID: 6404)
      • yt-dlp.exe (PID: 5748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs yt-dlp.exe powershell.exe no specs yt-dlp.exe ffmpeg.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3612C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
3984\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4136C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5576C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5748"C:\Users\admin\Desktop\ytcut\yt-dlp.exe" https://www.youtube.com/watch?v=2VppMGeA9dA -o 2VppMGeA9dA.webmC:\Users\admin\Desktop\ytcut\yt-dlp.exe
yt-dlp.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\ytcut\yt-dlp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6196"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\admin\Desktop\ytcut'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6404"C:\Users\admin\Desktop\ytcut\yt-dlp.exe" https://www.youtube.com/watch?v=2VppMGeA9dA -o 2VppMGeA9dA.webmC:\Users\admin\Desktop\ytcut\yt-dlp.exe
powershell.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\ytcut\yt-dlp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7704ffmpeg -bsfsC:\Users\admin\Desktop\ytcut\ffmpeg.exeyt-dlp.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\ytcut\ffmpeg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
8024"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\ffmpeg-2024-12-09-git-d21134313f-essentials_build.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
8 437
Read events
8 403
Write events
21
Delete events
13

Modification events

(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\ffmpeg-2024-12-09-git-d21134313f-essentials_build.7z
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(8024) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
116
Suspicious files
11
Text files
26
Unknown types
0

Dropped files

PID
Process
Filename
Type
8024WinRAR.exeC:\Users\admin\Desktop\ytcut\ffmpeg.exe
MD5:
SHA256:
6404yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI64042\Cryptodome\Cipher\_raw_arc2.pydexecutable
MD5:31F8353B80EA438AA705A7986DF24ED3
SHA256:89A51C145166DD24CF83D358ADE292B23F20B94BE783D5FE33A9DA2D7F2C14EB
6196powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_tnp5biry.zl5.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6404yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI64042\Cryptodome\Cipher\_raw_aesni.pydexecutable
MD5:973F11DE023C9337F35F9BB55C6154A6
SHA256:483758336267F8842F5432BB83300EA0FCB49C4E0B29962CBD7F27B1C3DFC56A
6196powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_yjkmumlj.kwk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6404yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI64042\Cryptodome\Cipher\_raw_cfb.pydexecutable
MD5:606E85B094AE6752E1099A176AA20F09
SHA256:917FA3438B61CC207D73BD72CDA6C42CD08656A2187FD9CA2860C67C12677238
6404yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI64042\Cryptodome\Cipher\_raw_cbc.pydexecutable
MD5:8D17946E6B1936061203AFE20CDDB5B0
SHA256:BB9898057572F17131BB63D513C19901E29D2E29215F7A93D6D84FA537475F0B
6196powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txttext
MD5:16B920DC9B3B830F07496308DC8E6CCC
SHA256:69EB04723CCFB919047F6C6DDFB32EC66973047306234CC4FD02429D994472BC
6404yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI64042\Cryptodome\Cipher\_raw_blowfish.pydexecutable
MD5:F86637FA9E2246C36B6FFB90CA83E66C
SHA256:933330BD2D55DE985B45BDD12B99291B4507C830CD6CC9E917CEDD1E49E878EC
6404yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI64042\Cryptodome\Cipher\_pkcs1_decode.pydexecutable
MD5:1831D77E3247E859A1BD4311637D5D17
SHA256:B04AB30C7AD39D852854AA0CCD9508D213EAA1B1D070B27D3679C1CBB53FAFC6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
125
DNS requests
163
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6508
firefox.exe
POST
200
2.16.206.148:80
http://r10.o.lencr.org/
unknown
whitelisted
6636
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
POST
200
2.16.206.143:80
http://r11.o.lencr.org/
unknown
whitelisted
624
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4024
svchost.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4024
svchost.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
2.16.206.143:80
http://e6.o.lencr.org/
unknown
whitelisted
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4024
svchost.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4024
svchost.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.16.204.160:443
www.bing.com
Akamai International B.V.
DE
whitelisted
23.218.210.69:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.35
  • 184.24.77.37
whitelisted
www.microsoft.com
  • 23.37.237.227
  • 88.221.169.152
whitelisted
google.com
  • 172.217.23.110
whitelisted
www.bing.com
  • 2.16.204.160
  • 2.16.204.141
  • 2.16.204.149
  • 2.16.204.145
  • 2.16.204.161
  • 2.16.204.146
  • 2.16.204.153
  • 2.16.204.148
  • 2.16.204.150
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
www.gyan.dev
  • 208.94.117.187
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
gyan.nfshost.com
  • 208.94.117.187
  • 2607:ff18:80::3b8e
unknown

Threats

No threats detected
No debug info