File name:

hw2.exe

Full analysis: https://app.any.run/tasks/a0d0ad01-306a-494e-9bf5-c218dc018a4e
Verdict: Malicious activity
Analysis date: April 29, 2025, 19:44:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

28F81FAD984A66E7078FFA11A1000D0D

SHA1:

73E1066B081E3811BB5609DC783E89AC3BFE07E6

SHA256:

45395BABA9C6357668204056CF6BB84B02561032AF99FAC7A2DA807B142393CA

SSDEEP:

98304:ekCACsG4ddvcvfsQqBih3B5ZTsNQThEaSyA5dP38Af4mlIQXK3t3VPmRAlv9Nsjl:IydibVGztwkWR5KkTDvGqf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • hw2.exe (PID: 6640)
    • Executable content was dropped or overwritten

      • hw2.exe (PID: 6640)
    • Process drops legitimate windows executable

      • hw2.exe (PID: 6640)
    • The process drops C-runtime libraries

      • hw2.exe (PID: 6640)
    • Application launched itself

      • hw2.exe (PID: 6640)
    • Connects to unusual port

      • hw2.exe (PID: 5968)
    • Potential Corporate Privacy Violation

      • hw2.exe (PID: 5968)
  • INFO

    • Reads the computer name

      • hw2.exe (PID: 6640)
    • Checks supported languages

      • hw2.exe (PID: 6640)
    • Create files in a temporary directory

      • hw2.exe (PID: 6640)
    • The sample compiled with english language support

      • hw2.exe (PID: 6640)
    • Checks proxy server information

      • hw2.exe (PID: 5968)
    • PyInstaller has been detected (YARA)

      • hw2.exe (PID: 6640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:02:16 01:41:48+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 144896
InitializedDataSize: 146944
UninitializedDataSize: -
EntryPoint: 0x9d30
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hw2.exe conhost.exe no specs hw2.exe

Process information

PID
CMD
Path
Indicators
Parent process
4300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exehw2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5968"C:\Users\admin\AppData\Local\Temp\hw2.exe" C:\Users\admin\AppData\Local\Temp\hw2.exe
hw2.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\windows\system32\samlib.dll
6640"C:\Users\admin\AppData\Local\Temp\hw2.exe" C:\Users\admin\AppData\Local\Temp\hw2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\hw2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
213
Read events
213
Write events
0
Delete events
0

Modification events

No data
Executable files
68
Suspicious files
1
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_cffi_backend.cp310-win_amd64.pydexecutable
MD5:282B92EF9ED04C419564FBAEE2C5CDBE
SHA256:5763C1D29903567CDE4D46355D3A7380D10143543986CA4EEBFCA4D22D991E3E
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_lzma.pydexecutable
MD5:80DA699F55CA8ED4DF2D154F17A08583
SHA256:2E3FD65C4E02C99A61344CE59E09EC7FDE74C671DB5F82A891732E1140910F20
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_hashlib.pydexecutable
MD5:4FB84E5D3F58453D7CCBF7BCC06266A0
SHA256:DF47255C100D9CC033A14C7D60051ABE89C24DA9C60362FE33CDF24C19651F7C
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_ssl.pydexecutable
MD5:CF2F95ECF1A72F8670177C081EEDEB04
SHA256:BA6025AB22D8E6C5AD53C66DC919F219A542E87540502905609B33DC0A8DDDD8
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_decimal.pydexecutable
MD5:95F1BE8C2D46AA4B5AD13F4FBB228C31
SHA256:F7864B8B37715A87F4F11D5CBFEFD5F1489399E064F7662FA0E0D7C5DF59D5E4
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:B0E0678DDC403EFFC7CDC69AE6D641FB
SHA256:45E48320ABE6E3C6079F3F6B84636920A367989A88F9BA6847F88C210D972CF1
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_multiprocessing.pydexecutable
MD5:33E605980938115563DB6F86CA200FA0
SHA256:589C601F278025D8B3D4C8B17ABBB962501E5057F250A0399A2A93300B3A7FFC
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_overlapped.pydexecutable
MD5:9873F4D9FCFB5E4EB84F8A23CE2945A6
SHA256:155401462E95DBB1A6E45B0C0FFE0549F682BFEEC39D4BB02C46C4CCE5560CAC
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_queue.pydexecutable
MD5:7E7D6DA688789AA48094EDA82BE671B7
SHA256:9AD5BCF2A88E1FFFF3B8EE29235DC92CE48B7FCA4655E87CB6E4D71BD1150AFB
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_socket.pydexecutable
MD5:7F25AB4019E6C759FC77383F523EF9AF
SHA256:D0497B79345B2C255F6274BAEA6AC44B74F345E111AB25BF6C91AF9B2A3F3B95
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
21
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5968
hw2.exe
GET
200
18.222.130.232:202
http://tomatotheft.csec202.fun:202/79d95df9068029064e8d6559bcb8fee4.html
unknown
unknown
516
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
516
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5968
hw2.exe
18.222.130.232:202
tomatotheft.csec202.fun
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.22
  • 23.216.77.33
  • 23.216.77.43
  • 23.216.77.34
  • 23.216.77.23
  • 23.216.77.10
  • 23.216.77.19
  • 23.216.77.18
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.66
  • 20.190.160.17
  • 20.190.160.130
  • 40.126.32.72
  • 20.190.160.4
  • 20.190.160.131
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
tomatotheft.csec202.fun
  • 18.222.130.232
unknown
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
5968
hw2.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
No debug info