File name:

TZProject.exe

Full analysis: https://app.any.run/tasks/2f0f1134-13ea-46a7-8a19-703338bf490f
Verdict: Malicious activity
Analysis date: November 23, 2024, 19:41:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
crypto-regex
python
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

F5B6E3497D19E52FB7FA80B74CF3416B

SHA1:

305F4579E47BB868AB66CAEF431A3F9B423496CE

SHA256:

53DE833DCE56FE03194ADD51C34FF41ED0825618CDD7EC776E6A1D9ECDE51291

SSDEEP:

98304:w6COJCZwlB4N+wcTAScUCYDKtHfktEzafhOsE+XZ03SA2ibMlq0Ti7UJDZ2pli9E:brcTyJwnGHS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • TZProject.exe (PID: 4556)
    • XORed URL has been found (YARA)

      • chrome.exe (PID: 6476)
  • SUSPICIOUS

    • Process drops python dynamic module

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • The process drops C-runtime libraries

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6636)
    • Process drops legitimate windows executable

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6636)
      • TZProject.exe (PID: 6564)
    • Executable content was dropped or overwritten

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Application launched itself

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Found regular expressions for crypto-addresses (YARA)

      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6404)
      • TZProject.exe (PID: 6584)
    • Loads Python modules

      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6404)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6656)
  • INFO

    • Checks supported languages

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6404)
      • chrome.exe (PID: 6476)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6636)
      • TZProject.exe (PID: 6656)
    • Create files in a temporary directory

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Reads the computer name

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6404)
      • chrome.exe (PID: 6476)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6636)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6656)
    • Creates files or folders in the user directory

      • TZProject.exe (PID: 4556)
    • PyInstaller has been detected (YARA)

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6404)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6636)
    • Manual execution by a user

      • TZProject.exe (PID: 6380)
      • chrome.exe (PID: 6476)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:16 21:49:47+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 198656
UninitializedDataSize: -
EntryPoint: 0xcdb0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
12
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start tzproject.exe tzproject.exe tzproject.exe tzproject.exe no specs #XOR-URL chrome.exe conhost.exe no specs tzproject.exe tzproject.exe no specs tzproject.exe tzproject.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4556"C:\Users\admin\AppData\Local\Temp\TZProject.exe" C:\Users\admin\AppData\Local\Temp\TZProject.exe
TZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5616"C:\Users\admin\AppData\Local\Temp\TZProject.exe" C:\Users\admin\AppData\Local\Temp\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6380"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6404"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exeTZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6476"C:\Users\admin\Desktop\chrome.exe" C:\Users\admin\Desktop\chrome.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
6484\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exechrome.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6564"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6584"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exeTZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6636"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6656"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exeTZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
1 479
Read events
1 479
Write events
0
Delete events
0

Modification events

No data
Executable files
213
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_hashlib.pydexecutable
MD5:32D76C9ABD65A5D2671AEEDE189BC290
SHA256:838D5C8B7C3212C8429BAF612623ABBBC20A9023EEC41E34E5461B76A285B86C
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\VCRUNTIME140_1.dllexecutable
MD5:68156F41AE9A04D89BB6625A5CD222D4
SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_decimal.pydexecutable
MD5:F3377F3DE29579140E2BBAEEFD334D4F
SHA256:B715D1C18E9A9C1531F21C02003B4C6726742D1A2441A1893BC3D79D7BB50E91
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_ctypes.pydexecutable
MD5:A55E57D7594303C89B5F7A1D1D6F2B67
SHA256:F63C6C7E71C342084D8F1A108786CA6975A52CEFEF8BE32CC2589E6E2FE060C8
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_socket.pydexecutable
MD5:FE896371430BD9551717EF12A3E7E818
SHA256:35246B04C6C7001CA448554246445A845CE116814A29B18B617EA38752E4659B
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_lzma.pydexecutable
MD5:1BA022D42024A655CF289544AE461FB8
SHA256:D080EABD015A3569813A220FD4EA74DFF34ED2A8519A10473EB37E22B1118A06
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:EFAD0EE0136532E8E8402770A64C71F9
SHA256:3D2C55902385381869DB850B526261DDEB4628B83E690A32B67D2E0936B2C6ED
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_wmi.pydexecutable
MD5:1C30CC7DF3BD168D883E93C593890B43
SHA256:6435C679A3A3FF4F16708EBC43F7CA62456C110AC1EA94F617D8052C90C143C7
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CFE0C1DFDE224EA5FED9BD5FF778A6E0
SHA256:0D0F80CBF476AF5B1C9FD3775E086ED0DFDB510CD0CC208EC1CCB04572396E3E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
38
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.18.121.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
440
svchost.exe
GET
200
2.18.121.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.18.121.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
440
svchost.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4144
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
760
lsass.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.18.121.155:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
2.18.121.155:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
440
svchost.exe
2.18.121.155:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
4712
MoUsoCoreWorker.exe
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
440
svchost.exe
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
2.16.106.200:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.18.121.155
  • 2.18.121.139
  • 2.18.121.140
  • 2.18.121.212
whitelisted
www.microsoft.com
  • 173.223.117.131
  • 104.119.109.218
whitelisted
www.bing.com
  • 2.16.106.200
  • 2.16.106.196
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.76
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.72
  • 20.190.160.14
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.210.18.13
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info