| File name: | zapret.exe |
| Full analysis: | https://app.any.run/tasks/aba840b6-469c-46dc-b319-56490a8352bf |
| Verdict: | Malicious activity |
| Analysis date: | December 18, 2024, 20:47:33 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 12 sections |
| MD5: | 45BC44427D305237D57849356227056A |
| SHA1: | 5E50DD554ABF2530275FD66F29973D0C578BF0CF |
| SHA256: | 39FE3D80771B4BC7408B56C801C2DA4FFB7F9F6A982AA5B1104084C98D5701C6 |
| SSDEEP: | 98304:hAu9sXotTtA2q9HpZyTL+9wmh7vSRpl89+bE9d9YbuvCjlhp4Tlcw15+EiBuL05P:zY1CM6P/ac5+Zboh11WkeNs |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:12:18 14:37:47+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 2.4 |
| CodeSize: | 96256 |
| InitializedDataSize: | 209408 |
| UninitializedDataSize: | 61440 |
| EntryPoint: | 0x10f6 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6324 | "C:\Users\admin\AppData\Local\Temp\zapret.exe" | C:\Users\admin\AppData\Local\Temp\zapret.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6480 | "C:\Users\admin\AppData\Local\Temp\zapret.exe" | C:\Users\admin\AppData\Local\Temp\zapret.exe | — | zapret.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6640 | "C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\_MEI63242\1.py | C:\Users\admin\AppData\Local\Temp\zapret.exe | zapret.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 6696 | "C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\_MEI63242\1.py | C:\Users\admin\AppData\Local\Temp\zapret.exe | zapret.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\VCRUNTIME140.dll | executable | |
MD5:0E675D4A7A5B7CCD69013386793F68EB | SHA256:BF5FF4603557C9959ACEC995653D052D9054AD4826DF967974EFD2F377C723D1 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_lzma.pyd | executable | |
MD5:37057C92F50391D0751F2C1D7AD25B02 | SHA256:9442DC46829485670A6AC0C02EF83C54B401F1570D1D5D1D85C19C1587487764 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_elementtree.pyd | executable | |
MD5:5240ABC89BB0822B4F1D830883A17578 | SHA256:DEC95E6D7AC0F15DAAC635F1ADDA13B4289BBE7175BA0B14494DC983601F0590 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_bz2.pyd | executable | |
MD5:3DC8AF67E6EE06AF9EEC52FE985A7633 | SHA256:C55821F5FDB0064C796B2C0B03B51971F073140BC210CBE6ED90387DB2BED929 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_win32sysloader.pyd | executable | |
MD5:DC2B691495107A597281EECF8FE49258 | SHA256:B155B2F3310E35F2AE40C89726453CBDBA48632A854192D78A9A7B634C310255 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\VCRUNTIME140_1.dll | executable | |
MD5:05052BE2C36166FF9646D7D00BB7413F | SHA256:26E470B29BED3D873E0C328186E53F95E9EDBFE0B0FD0CDA44743A0B1A04A828 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_ctypes.pyd | executable | |
MD5:F1E33A8F6F91C2ED93DC5049DD50D7B8 | SHA256:9459D246DF7A3C638776305CF3683946BA8DB26A7DE90DF8B60E1BE0B27E53C4 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_hashlib.pyd | executable | |
MD5:A6448BC5E5DA21A222DE164823ADD45C | SHA256:3692FC8E70E6E29910032240080FC8109248CE9A996F0A70D69ACF1542FCA69A | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_ssl.pyd | executable | |
MD5:8EE827F2FE931163F078ACDC97107B64 | SHA256:EAEEFA6722C45E486F48A67BA18B4ABB3FF0C29E5B30C23445C29A4D0B1CD3E4 | |||
| 6324 | zapret.exe | C:\Users\admin\AppData\Local\Temp\_MEI63242\_queue.pyd | executable | |
MD5:44B72E0AD8D1E1EC3D8722088B48C3C5 | SHA256:4AA1BBDE1621C49EDAB4376CF9A13C1AA00A9B0A9905D9640A2694EF92F77D5E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1684 | svchost.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1684 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
3992 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
6696 | zapret.exe | GET | 403 | 104.21.64.1:80 | http://9x9o.com/kvnm11412.txt | unknown | — | — | unknown |
188 | SIHClient.exe | GET | 200 | 23.215.121.133:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
188 | SIHClient.exe | GET | 200 | 23.215.121.133:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1448 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
1684 | svchost.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
1684 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 2.23.209.149:443 | www.bing.com | Akamai International B.V. | GB | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
brave.com |
| whitelisted |
raw.githubusercontent.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |