File name:

steam_auto_cracker_gui.exe

Full analysis: https://app.any.run/tasks/3d844002-6842-4460-9c9e-6080e4ceeb28
Verdict: Malicious activity
Analysis date: December 27, 2024, 15:06:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
python
github
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

9B13D23586BC94A9A03A74C703544D2F

SHA1:

404294664583896FC4E2FA82EFCF30CEA4D24A26

SHA256:

4544DD9CCCE49465D264ED6725036551C32975AB96014322F65499B79497F56A

SSDEEP:

98304:FbX+u8MRtSpupLGPW37nSJq+xI/iuqrW7VTfxTlRplE9bbL/lHe6BISGlbI9SseR:5kYbreI4y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • steam_auto_cracker_gui.exe (PID: 6396)
    • Process drops python dynamic module

      • steam_auto_cracker_gui.exe (PID: 6396)
    • Application launched itself

      • steam_auto_cracker_gui.exe (PID: 6396)
    • Loads Python modules

      • steam_auto_cracker_gui.exe (PID: 5464)
    • Executable content was dropped or overwritten

      • steam_auto_cracker_gui.exe (PID: 6396)
    • Starts CMD.EXE for commands execution

      • steam_auto_cracker_gui.exe (PID: 5464)
    • The process drops C-runtime libraries

      • steam_auto_cracker_gui.exe (PID: 6396)
  • INFO

    • Checks supported languages

      • steam_auto_cracker_gui.exe (PID: 6396)
      • steam_auto_cracker_gui.exe (PID: 5464)
    • Reads the computer name

      • steam_auto_cracker_gui.exe (PID: 6396)
      • steam_auto_cracker_gui.exe (PID: 5464)
    • PyInstaller has been detected (YARA)

      • steam_auto_cracker_gui.exe (PID: 6396)
    • Reads the machine GUID from the registry

      • steam_auto_cracker_gui.exe (PID: 5464)
    • Checks operating system version

      • steam_auto_cracker_gui.exe (PID: 5464)
    • The sample compiled with english language support

      • steam_auto_cracker_gui.exe (PID: 6396)
    • Create files in a temporary directory

      • steam_auto_cracker_gui.exe (PID: 6396)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:08:14 02:04:40+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.34
CodeSize: 165888
InitializedDataSize: 108544
UninitializedDataSize: -
EntryPoint: 0xb310
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start steam_auto_cracker_gui.exe steam_auto_cracker_gui.exe cmd.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5464"C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe" C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe
steam_auto_cracker_gui.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\steam_auto_cracker_gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6220\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6228C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exesteam_auto_cracker_gui.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
6396"C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe" C:\Users\admin\AppData\Local\Temp\steam_auto_cracker_gui.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\steam_auto_cracker_gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
350
Read events
350
Write events
0
Delete events
0

Modification events

No data
Executable files
61
Suspicious files
7
Text files
939
Unknown types
0

Dropped files

PID
Process
Filename
Type
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\_bz2.pydexecutable
MD5:B024A6F227EAFA8D43EDFC1A560FE651
SHA256:C0DD9496B19BA9536A78A43A97704E7D4BEF3C901D196ED385E771366682819D
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\VCRUNTIME140.dllexecutable
MD5:F34EB034AA4A9735218686590CBA2E8B
SHA256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:36CBC4736E74209433334B394F8EAAAC
SHA256:90C2C7B8BE4F8B51201C932C08AC1AF643C764EC92C7D6D9A03A6DFBA30955CA
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:36CC4DD2039DBF6E096A29C0CD41BE56
SHA256:0CF78976F12E91F442E188B819FC686DA59C626019DDD9E3269F24DFA9D202B0
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:D9FB770DF3592B312C812D7A9B50C3C4
SHA256:764624E3C0BFDAD64540628DE21EE223F8A57F04FB1CC86C69C74CE3B5589279
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\_lzma.pydexecutable
MD5:77B78B43D58FE7CE9EB2FBB1420889FA
SHA256:6E571D93CE55D09583EC91C607883A43C1DA3D4D36794D68C6ECD6BEA4AB466A
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\_tkinter.pydexecutable
MD5:77CF63868CAE43963B69B4561114CD19
SHA256:313FB33E72028FCC893EC7874E0C825C035CDCEBE1B5B7C7D8D11EF3AD1B354F
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\_socket.pydexecutable
MD5:CD56F508E7C305D4BFDEB820ECF3A323
SHA256:9E97B782B55400E5A914171817714BBBC713C0A396E30496C645FC82835E4B34
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\_queue.pydexecutable
MD5:328E41B501A51B58644C7C6930B03234
SHA256:2782CF3C04801EDE65011BE282E99CD34D163B2B2B2333FD3147B33F7D5E72AB
6396steam_auto_cracker_gui.exeC:\Users\admin\AppData\Local\Temp\_MEI63962\api-ms-win-core-interlocked-l1-1-0.dllexecutable
MD5:24E193B2850E4476CCBDFE29FCCC0FAE
SHA256:3D67A733EC8FD6078F9A8EC8AE864583D1A0195E070A088BA1942402E984A8EF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
31
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6456
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7044
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7044
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.155:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.170:443
www.bing.com
Akamai International B.V.
DE
unknown
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
23.218.210.69:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.155
  • 23.48.23.146
  • 23.48.23.139
  • 23.48.23.140
  • 23.48.23.153
  • 23.48.23.143
  • 23.48.23.145
  • 23.48.23.138
  • 23.48.23.147
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 104.126.37.170
  • 104.126.37.139
  • 104.126.37.153
  • 104.126.37.144
  • 104.126.37.162
  • 104.126.37.145
  • 104.126.37.155
  • 104.126.37.137
  • 104.126.37.163
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.140
  • 40.126.32.138
  • 20.190.160.20
  • 40.126.32.136
  • 40.126.32.76
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info