File name:

TZProject.exe

Full analysis: https://app.any.run/tasks/2f0f1134-13ea-46a7-8a19-703338bf490f
Verdict: Malicious activity
Analysis date: November 23, 2024, 19:41:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
crypto-regex
python
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

F5B6E3497D19E52FB7FA80B74CF3416B

SHA1:

305F4579E47BB868AB66CAEF431A3F9B423496CE

SHA256:

53DE833DCE56FE03194ADD51C34FF41ED0825618CDD7EC776E6A1D9ECDE51291

SSDEEP:

98304:w6COJCZwlB4N+wcTAScUCYDKtHfktEzafhOsE+XZ03SA2ibMlq0Ti7UJDZ2pli9E:brcTyJwnGHS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • TZProject.exe (PID: 4556)
    • XORed URL has been found (YARA)

      • chrome.exe (PID: 6476)
  • SUSPICIOUS

    • Process drops python dynamic module

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Application launched itself

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Loads Python modules

      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6404)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6656)
    • The process drops C-runtime libraries

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Executable content was dropped or overwritten

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Found regular expressions for crypto-addresses (YARA)

      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6404)
      • TZProject.exe (PID: 6584)
    • Process drops legitimate windows executable

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
  • INFO

    • Checks supported languages

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6404)
      • chrome.exe (PID: 6476)
      • TZProject.exe (PID: 6636)
      • TZProject.exe (PID: 6656)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6564)
    • Creates files or folders in the user directory

      • TZProject.exe (PID: 4556)
    • Manual execution by a user

      • TZProject.exe (PID: 6380)
      • chrome.exe (PID: 6476)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Create files in a temporary directory

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
    • Reads the computer name

      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 5616)
      • chrome.exe (PID: 6476)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6584)
      • TZProject.exe (PID: 6636)
      • TZProject.exe (PID: 6656)
      • TZProject.exe (PID: 6404)
    • PyInstaller has been detected (YARA)

      • TZProject.exe (PID: 5616)
      • TZProject.exe (PID: 4556)
      • TZProject.exe (PID: 6380)
      • TZProject.exe (PID: 6404)
      • TZProject.exe (PID: 6564)
      • TZProject.exe (PID: 6636)
      • TZProject.exe (PID: 6584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:16 21:49:47+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 198656
UninitializedDataSize: -
EntryPoint: 0xcdb0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
12
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start tzproject.exe tzproject.exe tzproject.exe tzproject.exe no specs #XOR-URL chrome.exe conhost.exe no specs tzproject.exe tzproject.exe no specs tzproject.exe tzproject.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4556"C:\Users\admin\AppData\Local\Temp\TZProject.exe" C:\Users\admin\AppData\Local\Temp\TZProject.exe
TZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5616"C:\Users\admin\AppData\Local\Temp\TZProject.exe" C:\Users\admin\AppData\Local\Temp\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6380"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6404"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exeTZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6476"C:\Users\admin\Desktop\chrome.exe" C:\Users\admin\Desktop\chrome.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
6484\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exechrome.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6564"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6584"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exeTZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6636"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6656"C:\Users\admin\Desktop\TZProject.exe" C:\Users\admin\Desktop\TZProject.exeTZProject.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tzproject.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
1 479
Read events
1 479
Write events
0
Delete events
0

Modification events

No data
Executable files
213
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_decimal.pydexecutable
MD5:F3377F3DE29579140E2BBAEEFD334D4F
SHA256:B715D1C18E9A9C1531F21C02003B4C6726742D1A2441A1893BC3D79D7BB50E91
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CFE0C1DFDE224EA5FED9BD5FF778A6E0
SHA256:0D0F80CBF476AF5B1C9FD3775E086ED0DFDB510CD0CC208EC1CCB04572396E3E
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:E8B9D74BFD1F6D1CC1D99B24F44DA796
SHA256:B1B3FD40AB437A43C8DB4994CCFFC7F88000CC8BB6E34A2BCBFF8E2464930C59
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_hashlib.pydexecutable
MD5:32D76C9ABD65A5D2671AEEDE189BC290
SHA256:838D5C8B7C3212C8429BAF612623ABBBC20A9023EEC41E34E5461B76A285B86C
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:ACCC640D1B06FB8552FE02F823126FF5
SHA256:332BA469AE84AA72EC8CCE2B33781DB1AB81A42ECE5863F7A3CB5A990059594F
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-libraryloader-l1-1-0.dllexecutable
MD5:1F2A00E72BC8FA2BD887BDB651ED6DE5
SHA256:9C8A08A7D40B6F697A21054770F1AFA9FFB197F90EF1EEE77C67751DF28B7142
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:1C58526D681EFE507DEB8F1935C75487
SHA256:EF13DCE8F71173315DFC64AB839B033AB19A968EE15230E9D4D2C9D558EFEEE2
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:BFFFA7117FD9B1622C66D949BAC3F1D7
SHA256:1EA267A2E6284F17DD548C6F2285E19F7EDB15D6E737A55391140CE5CB95225E
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\_lzma.pydexecutable
MD5:1BA022D42024A655CF289544AE461FB8
SHA256:D080EABD015A3569813A220FD4EA74DFF34ED2A8519A10473EB37E22B1118A06
5616TZProject.exeC:\Users\admin\AppData\Local\Temp\_MEI56162\api-ms-win-core-interlocked-l1-1-0.dllexecutable
MD5:C6024CC04201312F7688A021D25B056D
SHA256:8751D30DF554AF08EF42D2FAA0A71ABCF8C7D17CE9E9FF2EA68A4662603EC500
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
38
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
440
svchost.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
440
svchost.exe
GET
200
2.18.121.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.18.121.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.18.121.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
760
lsass.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
4144
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6304
SIHClient.exe
GET
200
104.119.109.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.18.121.155:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
2.18.121.155:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
440
svchost.exe
2.18.121.155:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
4712
MoUsoCoreWorker.exe
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
440
svchost.exe
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
2.16.106.200:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.18.121.155
  • 2.18.121.139
  • 2.18.121.140
  • 2.18.121.212
whitelisted
www.microsoft.com
  • 173.223.117.131
  • 104.119.109.218
whitelisted
www.bing.com
  • 2.16.106.200
  • 2.16.106.196
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.76
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.72
  • 20.190.160.14
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.210.18.13
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info