File name:

SecuriteInfo.com.Win64.Malware-gen.12798.1286

Full analysis: https://app.any.run/tasks/ac1bbe5a-d810-443d-b385-4ddb198d49b5
Verdict: Malicious activity
Analysis date: September 29, 2024, 07:17:45
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

C576703AC0C8860688070369FDCF09E7

SHA1:

5763FB7771DEEA9EA16BB50E6F99AC137D0F74FC

SHA256:

432B85F4D0A12B41074C7853BC3E78D1221BD808EC4D2F31594C0A26A2DB4F85

SSDEEP:

98304:4VIyDwsu8MxQtSpupLGPW37n+w5jnywT0IbuYlxakIbjQrfmpfaQtwgoX7VTfxTi:gfLEmXg9L1srhOr8MSinQ/+p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
    • Process drops python dynamic module

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
    • Process drops legitimate windows executable

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
    • The process drops C-runtime libraries

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
    • Application launched itself

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
    • Starts CMD.EXE for commands execution

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 32)
    • Loads Python modules

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 32)
  • INFO

    • Reads the computer name

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
    • Create files in a temporary directory

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 32)
    • Checks supported languages

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 32)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 32)
    • PyInstaller has been detected (YARA)

      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 32)
      • SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe (PID: 512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:09:26 21:22:31+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 176640
InitializedDataSize: 152576
UninitializedDataSize: -
EntryPoint: 0xc320
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT securiteinfo.com.win64.malware-gen.12798.1286.exe conhost.exe no specs THREAT securiteinfo.com.win64.malware-gen.12798.1286.exe no specs cmd.exe no specs sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
32"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe
SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win64.malware-gen.12798.1286.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
512"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.12798.1286.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win64.malware-gen.12798.1286.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1220C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2088C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2328C:\WINDOWS\system32\cmd.exe /c clsC:\Windows\System32\cmd.exeSecuriteInfo.com.Win64.Malware-gen.12798.1286.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
4744\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSecuriteInfo.com.Win64.Malware-gen.12798.1286.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6216"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
801
Read events
801
Write events
0
Delete events
0

Modification events

No data
Executable files
59
Suspicious files
4
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\_hashlib.pydexecutable
MD5:69DC506CF2FA3DA9D0CABA05FCA6A35D
SHA256:C5B8C4582E201FEF2D8CB2C8672D07B86DEC31AFB4A17B758DBFB2CFF163B12F
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\VCRUNTIME140.dllexecutable
MD5:F34EB034AA4A9735218686590CBA2E8B
SHA256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\_ctypes.pydexecutable
MD5:A1E9B3CC6B942251568E59FD3C342205
SHA256:A8703F949C9520B76CB1875D1176A23A2B3EF1D652D6DFAC6E1DE46DC08B2AA3
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\_decimal.pydexecutable
MD5:FF0BF710EB2D7817C49E1F4E21502073
SHA256:C6EB532DA62A115AE75F58766B632E005140A2E7C9C67A77564F1804685A377F
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\_lzma.pydexecutable
MD5:77B78B43D58FE7CE9EB2FBB1420889FA
SHA256:6E571D93CE55D09583EC91C607883A43C1DA3D4D36794D68C6ECD6BEA4AB466A
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:50CCEC6AA3033C421EC34A17625BDC08
SHA256:0D9125CC84892EF961F33F316139E027095E325D540A98D5CD8099633D31B368
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:6746E9CBC897101FD8CA22E42490614F
SHA256:81310FD7AAF3A8A280E6EFDDECD5A682C871FC6F5595A3BA131C9E60B58C80E1
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:AE0F85A63ADA456EEAF94B846FE8BD26
SHA256:305CE445FA2E3BBD9ACA3F1A31CA8C805DAEC293CC79BCD20B39EA5AE5B9989D
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\_uuid.pydexecutable
MD5:D7074A9D35ED4FF90B93660ED4F1BA75
SHA256:C4CE019FBD541918D3E7DDF7845BF0449068FC7EEE3B57DA730860FC7741D561
512SecuriteInfo.com.Win64.Malware-gen.12798.1286.exeC:\Users\admin\AppData\Local\Temp\_MEI5122\_queue.pydexecutable
MD5:328E41B501A51B58644C7C6930B03234
SHA256:2782CF3C04801EDE65011BE282E99CD34D163B2B2B2333FD3147B33F7D5E72AB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
50
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4888
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1768
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4888
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3296
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6796
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1768
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1768
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.67
  • 20.190.159.0
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted
browser.pipe.aria.microsoft.com
  • 20.189.173.12
whitelisted

Threats

No threats detected
No debug info