File name:

zapret.exe

Full analysis: https://app.any.run/tasks/b7b775a8-8e34-40d5-a1a5-35c2f0a8767f
Verdict: Malicious activity
Analysis date: December 18, 2024, 20:57:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 12 sections
MD5:

45BC44427D305237D57849356227056A

SHA1:

5E50DD554ABF2530275FD66F29973D0C578BF0CF

SHA256:

39FE3D80771B4BC7408B56C801C2DA4FFB7F9F6A982AA5B1104084C98D5701C6

SSDEEP:

98304:hAu9sXotTtA2q9HpZyTL+9wmh7vSRpl89+bE9d9YbuvCjlhp4Tlcw15+EiBuL05P:zY1CM6P/ac5+Zboh11WkeNs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
    • Reads security settings of Internet Explorer

      • zapret.exe (PID: 5008)
    • Executable content was dropped or overwritten

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
    • Reads the date of Windows installation

      • zapret.exe (PID: 5008)
    • Loads Python modules

      • zapret.exe (PID: 5008)
      • zapret.exe (PID: 1804)
    • Application launched itself

      • zapret.exe (PID: 5008)
      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
    • Process drops legitimate windows executable

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
    • Process drops python dynamic module

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
  • INFO

    • Checks supported languages

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 5008)
      • zapret.exe (PID: 1744)
      • zapret.exe (PID: 1804)
    • Create files in a temporary directory

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
    • Reads the computer name

      • zapret.exe (PID: 5008)
      • zapret.exe (PID: 1744)
      • zapret.exe (PID: 5736)
    • Process checks computer location settings

      • zapret.exe (PID: 5008)
    • The sample compiled with english language support

      • zapret.exe (PID: 5736)
      • zapret.exe (PID: 1744)
    • Reads the machine GUID from the registry

      • zapret.exe (PID: 5008)
      • zapret.exe (PID: 1804)
    • Checks proxy server information

      • zapret.exe (PID: 1804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:12:18 14:37:47+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.4
CodeSize: 96256
InitializedDataSize: 209408
UninitializedDataSize: 61440
EntryPoint: 0x10f6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start zapret.exe zapret.exe no specs zapret.exe zapret.exe

Process information

PID
CMD
Path
Indicators
Parent process
1744"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\_MEI57362\1.pyC:\Users\admin\AppData\Local\Temp\zapret.exe
zapret.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1804"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\_MEI57362\1.pyC:\Users\admin\AppData\Local\Temp\zapret.exe
zapret.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5008"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\zapret.exezapret.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5736"C:\Users\admin\AppData\Local\Temp\zapret.exe" C:\Users\admin\AppData\Local\Temp\zapret.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\zapret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
945
Read events
945
Write events
0
Delete events
0

Modification events

No data
Executable files
58
Suspicious files
3
Text files
6
Unknown types
1

Dropped files

PID
Process
Filename
Type
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\VCRUNTIME140_1.dllexecutable
MD5:05052BE2C36166FF9646D7D00BB7413F
SHA256:26E470B29BED3D873E0C328186E53F95E9EDBFE0B0FD0CDA44743A0B1A04A828
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\_bz2.pydexecutable
MD5:3DC8AF67E6EE06AF9EEC52FE985A7633
SHA256:C55821F5FDB0064C796B2C0B03B51971F073140BC210CBE6ED90387DB2BED929
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\libffi-7.dllexecutable
MD5:4424BAF6ED5340DF85482FA82B857B03
SHA256:8C1F7F64579D01FEDFDE07E0906B1F8E607C34D5E6424C87ABE431A2322EBA79
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\mfc140u.dllexecutable
MD5:CD1D99DF975EE5395174DF834E82B256
SHA256:D8CA1DEA862085F0204680230D29BFF4D168FFF675AB4700EEAF63704D995CB3
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\charset_normalizer\md__mypyc.cp38-win_amd64.pydexecutable
MD5:D702A14B17BCD02C9AD1CE8137D925AA
SHA256:98C04FDC308F1D6388BB129F0101F88EBB020AEB8116F280129E19CDCB832D8D
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\_socket.pydexecutable
MD5:D6BAE4B430F349AB42553DC738699F0E
SHA256:587C4F3092B5F3E34F6B1E927ECC7127B3FE2F7FA84E8A3D0C41828583BD5CEF
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\_win32sysloader.pydexecutable
MD5:DC2B691495107A597281EECF8FE49258
SHA256:B155B2F3310E35F2AE40C89726453CBDBA48632A854192D78A9A7B634C310255
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\charset_normalizer\md.cp38-win_amd64.pydexecutable
MD5:19286C0938EE5B29D916B4035E539200
SHA256:CBCB25410A11775DF37DCF4809B6EC5D6F3AA1E997C8AC8CD3FAA2C155121693
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\psutil\_psutil_windows.pydexecutable
MD5:49AC12A1F10AB93FAFAB064FD0523A63
SHA256:BA033B79E858DBFCBA6BF8FB5AFE10DEFD1CB03957DBBC68E8E62E4DE6DF492D
5736zapret.exeC:\Users\admin\AppData\Local\Temp\_MEI57362\libcrypto-1_1.dllexecutable
MD5:BF83F8AD60CB9DB462CE62C73208A30D
SHA256:012866B68F458EC204B9BCE067AF8F4A488860774E7E17973C49E583B52B828D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
39
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1804
zapret.exe
GET
403
104.21.64.1:80
http://9x9o.com/kvnm11412.txt
unknown
unknown
4328
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6604
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6604
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.23.209.140:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
716
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
google.com
  • 172.217.23.110
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.209.140
  • 2.23.209.135
  • 2.23.209.176
  • 2.23.209.182
  • 2.23.209.150
  • 2.23.209.179
  • 2.23.209.148
  • 2.23.209.158
  • 2.23.209.177
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
login.live.com
  • 40.126.32.134
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.74
  • 20.190.160.20
  • 40.126.32.76
  • 40.126.32.68
  • 40.126.32.136
whitelisted
brave.com
  • 3.161.82.99
  • 3.161.82.27
  • 3.161.82.114
  • 3.161.82.9
whitelisted
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.108.133
shared
9x9o.com
  • 104.21.64.1
  • 104.21.96.1
  • 104.21.16.1
  • 104.21.48.1
  • 104.21.112.1
  • 104.21.80.1
  • 104.21.32.1
unknown

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info