File name:

picasa (1).exe

Full analysis: https://app.any.run/tasks/108d6294-4c67-411d-a769-610a9bc966ce
Verdict: Malicious activity
Analysis date: November 14, 2024, 08:27:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

A5346C882894CD891B31CB5FEC8F2A4C

SHA1:

7CE381801E590DA68A9E211E4A2CA33E6D0CE3C1

SHA256:

3083052557765F468F5E71F0132CE5C5991B7AB7E896284D594297555274050A

SSDEEP:

98304:+6CnmtOXQ428JGHna2M0GGXtHfktEzafhOsE+XZ0M1uKSolBgOI/dVF9aWjDIbjL:grjIXzJcTeRi/BqDnM7QQIFt16p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • picasa (1).exe (PID: 3828)
    • Process drops python dynamic module

      • picasa (1).exe (PID: 3828)
    • Application launched itself

      • picasa (1).exe (PID: 3828)
    • Process drops legitimate windows executable

      • picasa (1).exe (PID: 3828)
    • The process drops C-runtime libraries

      • picasa (1).exe (PID: 3828)
    • Loads Python modules

      • picasa (1).exe (PID: 6148)
  • INFO

    • Create files in a temporary directory

      • picasa (1).exe (PID: 3828)
      • picasa (1).exe (PID: 6148)
    • Reads the computer name

      • picasa (1).exe (PID: 3828)
    • Checks supported languages

      • picasa (1).exe (PID: 3828)
    • PyInstaller has been detected (YARA)

      • picasa (1).exe (PID: 3828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:13 11:10:02+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xcdb0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT picasa (1).exe picasa (1).exe

Process information

PID
CMD
Path
Indicators
Parent process
3828"C:\Users\admin\AppData\Local\Temp\picasa (1).exe" C:\Users\admin\AppData\Local\Temp\picasa (1).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\picasa (1).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6148"C:\Users\admin\AppData\Local\Temp\picasa (1).exe" C:\Users\admin\AppData\Local\Temp\picasa (1).exe
picasa (1).exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\picasa (1).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
313
Read events
313
Write events
0
Delete events
0

Modification events

No data
Executable files
61
Suspicious files
1
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_decimal.pydexecutable
MD5:D47E6ACF09EAD5774D5B471AB3AB96FF
SHA256:D0DF57988A74ACD50B2D261E8B5F2C25DA7B940EC2AAFBEE444C277552421E6E
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_cffi_backend.cp311-win_amd64.pydexecutable
MD5:210DEF84BB2C35115A2B2AC25E3FFD8F
SHA256:59767B0918859BEDDF28A7D66A50431411FFD940C32B3E8347E6D938B60FACDF
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_bz2.pydexecutable
MD5:4101128E19134A4733028CFAAFC2F3BB
SHA256:5843872D5E2B08F138A71FE9BA94813AFEE59C8B48166D4A8EB0F606107A7E80
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:EB0978A9213E7F6FDD63B2967F02D999
SHA256:AB25A1FE836FC68BCB199F1FE565C27D26AF0C390A38DA158E0D8815EFE1103E
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:EFAD0EE0136532E8E8402770A64C71F9
SHA256:3D2C55902385381869DB850B526261DDEB4628B83E690A32B67D2E0936B2C6ED
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CFE0C1DFDE224EA5FED9BD5FF778A6E0
SHA256:0D0F80CBF476AF5B1C9FD3775E086ED0DFDB510CD0CC208EC1CCB04572396E3E
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:33BBECE432F8DA57F17BF2E396EBAA58
SHA256:7CF0944901F7F7E0D0B9AD62753FC2FE380461B1CCE8CDC7E9C9867C980E3B0E
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:1C58526D681EFE507DEB8F1935C75487
SHA256:EF13DCE8F71173315DFC64AB839B033AB19A968EE15230E9D4D2C9D558EFEEE2
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\_socket.pydexecutable
MD5:8140BDC5803A4893509F0E39B67158CE
SHA256:39715EF8D043354F0AB15F62878530A38518FB6192BC48DA6A098498E8D35769
3828picasa (1).exeC:\Users\admin\AppData\Local\Temp\_MEI38282\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:BFFFA7117FD9B1622C66D949BAC3F1D7
SHA256:1EA267A2E6284F17DD548C6F2285E19F7EDB15D6E737A55391140CE5CB95225E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
42
DNS requests
22
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2076
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2620
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2620
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5588
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7060
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4360
SearchApp.exe
2.23.209.143:443
www.bing.com
Akamai International B.V.
GB
whitelisted
2076
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.218.209.163
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 2.23.209.143
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.144
  • 2.23.209.162
  • 2.23.209.160
  • 2.23.209.149
  • 2.23.209.156
  • 2.23.209.176
  • 2.23.209.179
  • 2.23.209.175
  • 2.23.209.177
  • 2.23.209.181
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.73
  • 20.190.159.75
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.23
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
th.bing.com
  • 2.23.209.144
  • 2.23.209.141
  • 2.23.209.158
  • 2.23.209.154
  • 2.23.209.150
  • 2.23.209.143
  • 2.23.209.156
  • 2.23.209.160
  • 2.23.209.149
whitelisted
webhook.site
  • 178.63.67.106
  • 178.63.67.153
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Misc activity
ET INFO DNS Query for Webhook/HTTP Request Inspection Service (webhook .site)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
2172
svchost.exe
Misc activity
ET INFO DNS Query for Webhook/HTTP Request Inspection Service (webhook .site)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
6148
picasa (1).exe
Misc activity
ET INFO Webhook/HTTP Request Inspection Service Domain (webhook .site in TLS SNI)
No debug info