File name:

picasa (1).exe

Full analysis: https://app.any.run/tasks/108d6294-4c67-411d-a769-610a9bc966ce
Verdict: Malicious activity
Analysis date: November 14, 2024, 08:27:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

A5346C882894CD891B31CB5FEC8F2A4C

SHA1:

7CE381801E590DA68A9E211E4A2CA33E6D0CE3C1

SHA256:

3083052557765F468F5E71F0132CE5C5991B7AB7E896284D594297555274050A

SSDEEP:

98304:+6CnmtOXQ428JGHna2M0GGXtHfktEzafhOsE+XZ0M1uKSolBgOI/dVF9aWjDIbjL:grjIXzJcTeRi/BqDnM7QQIFt16p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • picasa (1).exe (PID: 3828)
    • Loads Python modules

      • picasa (1).exe (PID: 6148)
    • Process drops python dynamic module

      • picasa (1).exe (PID: 3828)
    • Process drops legitimate windows executable

      • picasa (1).exe (PID: 3828)
    • Application launched itself

      • picasa (1).exe (PID: 3828)
    • Executable content was dropped or overwritten

      • picasa (1).exe (PID: 3828)
  • INFO

    • Create files in a temporary directory

      • picasa (1).exe (PID: 3828)
      • picasa (1).exe (PID: 6148)
    • Reads the computer name

      • picasa (1).exe (PID: 3828)
    • Checks supported languages

      • picasa (1).exe (PID: 3828)
    • PyInstaller has been detected (YARA)

      • picasa (1).exe (PID: 3828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:13 11:10:02+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xcdb0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT picasa (1).exe picasa (1).exe

Process information

PID
CMD
Path
Indicators
Parent process
3828"C:\Users\admin\AppData\Local\Temp\picasa (1).exe" C:\Users\admin\AppData\Local\Temp\picasa (1).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\picasa (1).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6148"C:\Users\admin\AppData\Local\Temp\picasa (1).exe" C:\Users\admin\AppData\Local\Temp\picasa (1).exe
picasa (1).exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\picasa (1).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
313
Read events
313
Write events
0
Delete events
0

Modification events

No data
Executable files
61
Suspicious files
1
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_hashlib.pydexecutable
MD5:DE4D104EA13B70C093B07219D2EFF6CB
SHA256:39BC615842A176DB72D4E0558F3CDCAE23AB0623AD132F815D21DCFBFD4B110E
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_ctypes.pydexecutable
MD5:6A9CA97C039D9BBB7ABF40B53C851198
SHA256:E662D2B35BB48C5F3432BDE79C0D20313238AF800968BA0FAA6EA7E7E5EF4535
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\VCRUNTIME140.dllexecutable
MD5:F12681A472B9DD04A812E16096514974
SHA256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_cffi_backend.cp311-win_amd64.pydexecutable
MD5:210DEF84BB2C35115A2B2AC25E3FFD8F
SHA256:59767B0918859BEDDF28A7D66A50431411FFD940C32B3E8347E6D938B60FACDF
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:E8B9D74BFD1F6D1CC1D99B24F44DA796
SHA256:B1B3FD40AB437A43C8DB4994CCFFC7F88000CC8BB6E34A2BCBFF8E2464930C59
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:33BBECE432F8DA57F17BF2E396EBAA58
SHA256:7CF0944901F7F7E0D0B9AD62753FC2FE380461B1CCE8CDC7E9C9867C980E3B0E
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:EFAD0EE0136532E8E8402770A64C71F9
SHA256:3D2C55902385381869DB850B526261DDEB4628B83E690A32B67D2E0936B2C6ED
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_socket.pydexecutable
MD5:8140BDC5803A4893509F0E39B67158CE
SHA256:39715EF8D043354F0AB15F62878530A38518FB6192BC48DA6A098498E8D35769
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_queue.pydexecutable
MD5:FF8300999335C939FCCE94F2E7F039C0
SHA256:2F71046891BA279B00B70EB031FE90B379DBE84559CF49CE5D1297EA6BF47A78
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_ssl.pydexecutable
MD5:069BCCC9F31F57616E88C92650589BDD
SHA256:CB42E8598E3FA53EEEBF63F2AF1730B9EC64614BDA276AB2CD1F1C196B3D7E32
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
42
DNS requests
22
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2076
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2620
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2620
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5588
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7060
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4360
SearchApp.exe
2.23.209.143:443
www.bing.com
Akamai International B.V.
GB
whitelisted
2076
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.218.209.163
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 2.23.209.143
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.144
  • 2.23.209.162
  • 2.23.209.160
  • 2.23.209.149
  • 2.23.209.156
  • 2.23.209.176
  • 2.23.209.179
  • 2.23.209.175
  • 2.23.209.177
  • 2.23.209.181
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.73
  • 20.190.159.75
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.23
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
th.bing.com
  • 2.23.209.144
  • 2.23.209.141
  • 2.23.209.158
  • 2.23.209.154
  • 2.23.209.150
  • 2.23.209.143
  • 2.23.209.156
  • 2.23.209.160
  • 2.23.209.149
whitelisted
webhook.site
  • 178.63.67.106
  • 178.63.67.153
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Misc activity
ET INFO DNS Query for Webhook/HTTP Request Inspection Service (webhook .site)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
2172
svchost.exe
Misc activity
ET INFO DNS Query for Webhook/HTTP Request Inspection Service (webhook .site)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
No debug info