File name:

zapret.exe

Full analysis: https://app.any.run/tasks/aba840b6-469c-46dc-b319-56490a8352bf
Verdict: Malicious activity
Analysis date: December 18, 2024, 20:47:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 12 sections
MD5:

45BC44427D305237D57849356227056A

SHA1:

5E50DD554ABF2530275FD66F29973D0C578BF0CF

SHA256:

39FE3D80771B4BC7408B56C801C2DA4FFB7F9F6A982AA5B1104084C98D5701C6

SSDEEP:

98304:hAu9sXotTtA2q9HpZyTL+9wmh7vSRpl89+bE9d9YbuvCjlhp4Tlcw15+EiBuL05P:zY1CM6P/ac5+Zboh11WkeNs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6640)
    • Executable content was dropped or overwritten

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6640)
    • Process drops python dynamic module

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6640)
    • The process drops C-runtime libraries

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6640)
    • Application launched itself

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6480)
      • zapret.exe (PID: 6640)
    • Reads security settings of Internet Explorer

      • zapret.exe (PID: 6480)
    • Loads Python modules

      • zapret.exe (PID: 6480)
      • zapret.exe (PID: 6696)
    • Reads the date of Windows installation

      • zapret.exe (PID: 6480)
  • INFO

    • Reads the computer name

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6480)
      • zapret.exe (PID: 6640)
      • zapret.exe (PID: 6696)
    • Checks supported languages

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6480)
      • zapret.exe (PID: 6640)
      • zapret.exe (PID: 6696)
    • Create files in a temporary directory

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6640)
      • zapret.exe (PID: 6696)
    • The sample compiled with english language support

      • zapret.exe (PID: 6324)
      • zapret.exe (PID: 6640)
    • Reads the machine GUID from the registry

      • zapret.exe (PID: 6480)
      • zapret.exe (PID: 6696)
    • Process checks computer location settings

      • zapret.exe (PID: 6480)
    • Checks proxy server information

      • zapret.exe (PID: 6696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:12:18 14:37:47+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.4
CodeSize: 96256
InitializedDataSize: 209408
UninitializedDataSize: 61440
EntryPoint: 0x10f6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start zapret.exe zapret.exe no specs zapret.exe zapret.exe

Process information

PID
CMD
Path
Indicators
Parent process
6324"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\zapret.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6480"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\zapret.exezapret.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6640"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\_MEI63242\1.pyC:\Users\admin\AppData\Local\Temp\zapret.exe
zapret.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6696"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\_MEI63242\1.pyC:\Users\admin\AppData\Local\Temp\zapret.exe
zapret.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
945
Read events
945
Write events
0
Delete events
0

Modification events

No data
Executable files
58
Suspicious files
2
Text files
6
Unknown types
2

Dropped files

PID
Process
Filename
Type
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\VCRUNTIME140.dllexecutable
MD5:0E675D4A7A5B7CCD69013386793F68EB
SHA256:BF5FF4603557C9959ACEC995653D052D9054AD4826DF967974EFD2F377C723D1
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_lzma.pydexecutable
MD5:37057C92F50391D0751F2C1D7AD25B02
SHA256:9442DC46829485670A6AC0C02EF83C54B401F1570D1D5D1D85C19C1587487764
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_elementtree.pydexecutable
MD5:5240ABC89BB0822B4F1D830883A17578
SHA256:DEC95E6D7AC0F15DAAC635F1ADDA13B4289BBE7175BA0B14494DC983601F0590
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_bz2.pydexecutable
MD5:3DC8AF67E6EE06AF9EEC52FE985A7633
SHA256:C55821F5FDB0064C796B2C0B03B51971F073140BC210CBE6ED90387DB2BED929
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_win32sysloader.pydexecutable
MD5:DC2B691495107A597281EECF8FE49258
SHA256:B155B2F3310E35F2AE40C89726453CBDBA48632A854192D78A9A7B634C310255
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\VCRUNTIME140_1.dllexecutable
MD5:05052BE2C36166FF9646D7D00BB7413F
SHA256:26E470B29BED3D873E0C328186E53F95E9EDBFE0B0FD0CDA44743A0B1A04A828
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_ctypes.pydexecutable
MD5:F1E33A8F6F91C2ED93DC5049DD50D7B8
SHA256:9459D246DF7A3C638776305CF3683946BA8DB26A7DE90DF8B60E1BE0B27E53C4
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_hashlib.pydexecutable
MD5:A6448BC5E5DA21A222DE164823ADD45C
SHA256:3692FC8E70E6E29910032240080FC8109248CE9A996F0A70D69ACF1542FCA69A
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_ssl.pydexecutable
MD5:8EE827F2FE931163F078ACDC97107B64
SHA256:EAEEFA6722C45E486F48A67BA18B4ABB3FF0C29E5B30C23445C29A4D0B1CD3E4
6324zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI63242\_queue.pydexecutable
MD5:44B72E0AD8D1E1EC3D8722088B48C3C5
SHA256:4AA1BBDE1621C49EDAB4376CF9A13C1AA00A9B0A9905D9640A2694EF92F77D5E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
39
DNS requests
22
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1684
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1684
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3992
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6696
zapret.exe
GET
403
104.21.64.1:80
http://9x9o.com/kvnm11412.txt
unknown
unknown
188
SIHClient.exe
GET
200
23.215.121.133:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
188
SIHClient.exe
GET
200
23.215.121.133:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1448
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
1684
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
unknown
1684
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.215.121.133
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.140
  • 2.23.209.182
  • 2.23.209.148
  • 2.23.209.179
  • 2.23.209.185
  • 2.23.209.130
  • 2.23.209.176
  • 2.23.209.177
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.75
  • 40.126.31.69
  • 40.126.31.71
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.73
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
brave.com
  • 18.66.122.72
  • 18.66.122.67
  • 18.66.122.84
  • 18.66.122.122
whitelisted
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.110.133
unknown

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info