File name:

hw2.exe

Full analysis: https://app.any.run/tasks/a0d0ad01-306a-494e-9bf5-c218dc018a4e
Verdict: Malicious activity
Analysis date: April 29, 2025, 19:44:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

28F81FAD984A66E7078FFA11A1000D0D

SHA1:

73E1066B081E3811BB5609DC783E89AC3BFE07E6

SHA256:

45395BABA9C6357668204056CF6BB84B02561032AF99FAC7A2DA807B142393CA

SSDEEP:

98304:ekCACsG4ddvcvfsQqBih3B5ZTsNQThEaSyA5dP38Af4mlIQXK3t3VPmRAlv9Nsjl:IydibVGztwkWR5KkTDvGqf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • hw2.exe (PID: 6640)
    • Process drops legitimate windows executable

      • hw2.exe (PID: 6640)
    • Process drops python dynamic module

      • hw2.exe (PID: 6640)
    • Application launched itself

      • hw2.exe (PID: 6640)
    • The process drops C-runtime libraries

      • hw2.exe (PID: 6640)
    • Potential Corporate Privacy Violation

      • hw2.exe (PID: 5968)
    • Connects to unusual port

      • hw2.exe (PID: 5968)
  • INFO

    • Create files in a temporary directory

      • hw2.exe (PID: 6640)
    • Checks supported languages

      • hw2.exe (PID: 6640)
    • Reads the computer name

      • hw2.exe (PID: 6640)
    • The sample compiled with english language support

      • hw2.exe (PID: 6640)
    • PyInstaller has been detected (YARA)

      • hw2.exe (PID: 6640)
    • Checks proxy server information

      • hw2.exe (PID: 5968)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:02:16 01:41:48+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 144896
InitializedDataSize: 146944
UninitializedDataSize: -
EntryPoint: 0x9d30
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hw2.exe conhost.exe no specs hw2.exe

Process information

PID
CMD
Path
Indicators
Parent process
4300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exehw2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5968"C:\Users\admin\AppData\Local\Temp\hw2.exe" C:\Users\admin\AppData\Local\Temp\hw2.exe
hw2.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\windows\system32\samlib.dll
6640"C:\Users\admin\AppData\Local\Temp\hw2.exe" C:\Users\admin\AppData\Local\Temp\hw2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\hw2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
213
Read events
213
Write events
0
Delete events
0

Modification events

No data
Executable files
68
Suspicious files
1
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_asyncio.pydexecutable
MD5:005A179ADE9B170BFC073E6FAFFC40EE
SHA256:3EA0D07F4A434C172655E6E8012339486368D355C542606BC1BCBE0CABD7F874
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_ctypes.pydexecutable
MD5:C8F57695AF24A4F71DAFA887CE731EBC
SHA256:E3B69285F27A8AD97555BEBEA29628A93333DE203EE2FAE95B73B6B6D6C162B1
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_cffi_backend.cp310-win_amd64.pydexecutable
MD5:282B92EF9ED04C419564FBAEE2C5CDBE
SHA256:5763C1D29903567CDE4D46355D3A7380D10143543986CA4EEBFCA4D22D991E3E
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_decimal.pydexecutable
MD5:95F1BE8C2D46AA4B5AD13F4FBB228C31
SHA256:F7864B8B37715A87F4F11D5CBFEFD5F1489399E064F7662FA0E0D7C5DF59D5E4
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_bz2.pydexecutable
MD5:E877E39CC3C42ED1F5461E2D5E62FC0F
SHA256:4B1D29F19ADAF856727FA4A1F50EEE0A86C893038DFBA2E52F26C11AB5B3672F
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_elementtree.pydexecutable
MD5:C25EC046C0C7A2FE9E10A3B059F77436
SHA256:F93B90ABFFB837FD024E2A9A5DEC8C9C79B275AE128065DAC7623A2F9D974319
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_hashlib.pydexecutable
MD5:4FB84E5D3F58453D7CCBF7BCC06266A0
SHA256:DF47255C100D9CC033A14C7D60051ABE89C24DA9C60362FE33CDF24C19651F7C
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_overlapped.pydexecutable
MD5:9873F4D9FCFB5E4EB84F8A23CE2945A6
SHA256:155401462E95DBB1A6E45B0C0FFE0549F682BFEEC39D4BB02C46C4CCE5560CAC
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_lzma.pydexecutable
MD5:80DA699F55CA8ED4DF2D154F17A08583
SHA256:2E3FD65C4E02C99A61344CE59E09EC7FDE74C671DB5F82A891732E1140910F20
6640hw2.exeC:\Users\admin\AppData\Local\Temp\_MEI66402\_queue.pydexecutable
MD5:7E7D6DA688789AA48094EDA82BE671B7
SHA256:9AD5BCF2A88E1FFFF3B8EE29235DC92CE48B7FCA4655E87CB6E4D71BD1150AFB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
21
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5968
hw2.exe
GET
200
18.222.130.232:202
http://tomatotheft.csec202.fun:202/79d95df9068029064e8d6559bcb8fee4.html
unknown
unknown
516
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
516
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5968
hw2.exe
18.222.130.232:202
tomatotheft.csec202.fun
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.22
  • 23.216.77.33
  • 23.216.77.43
  • 23.216.77.34
  • 23.216.77.23
  • 23.216.77.10
  • 23.216.77.19
  • 23.216.77.18
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.66
  • 20.190.160.17
  • 20.190.160.130
  • 40.126.32.72
  • 20.190.160.4
  • 20.190.160.131
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
tomatotheft.csec202.fun
  • 18.222.130.232
unknown
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
5968
hw2.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
No debug info