File name:

cubaris.exe

Full analysis: https://app.any.run/tasks/282e2055-8193-42ce-bc02-8a37e95e07fd
Verdict: Malicious activity
Analysis date: November 25, 2024, 15:42:12
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

D45DD5CD60E947FA271E25033A53663A

SHA1:

54D77D769BA1C118D3C794EC8F1FBD87EB4A1935

SHA256:

56956F38B92ED02809CE30CD800A43A2744C74B17FDBA2F67FBE513F6B4290B6

SSDEEP:

98304:xJ3u4ajdILbOZt9CyLVe1SWx23evqBQTugnt+J9WCETYhaRjg20VPDAAQm7SukZJ:uP/acG20k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • cubaris.exe (PID: 4328)
    • Application launched itself

      • cubaris.exe (PID: 4328)
    • The process drops C-runtime libraries

      • cubaris.exe (PID: 4328)
    • Executable content was dropped or overwritten

      • cubaris.exe (PID: 4328)
    • Process drops python dynamic module

      • cubaris.exe (PID: 4328)
  • INFO

    • Checks supported languages

      • cubaris.exe (PID: 4328)
      • cubaris.exe (PID: 4804)
    • Reads the computer name

      • cubaris.exe (PID: 4328)
    • Create files in a temporary directory

      • cubaris.exe (PID: 4328)
    • PyInstaller has been detected (YARA)

      • cubaris.exe (PID: 4328)
    • Reads the machine GUID from the registry

      • cubaris.exe (PID: 4804)
    • Checks proxy server information

      • cubaris.exe (PID: 4804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:25 15:41:48+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xce20
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cubaris.exe cubaris.exe cubaris.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3092"C:\Users\admin\AppData\Local\Temp\cubaris.exe" C:\Users\admin\AppData\Local\Temp\cubaris.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\cubaris.exe
c:\windows\system32\ntdll.dll
4328"C:\Users\admin\AppData\Local\Temp\cubaris.exe" C:\Users\admin\AppData\Local\Temp\cubaris.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\cubaris.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4804"C:\Users\admin\AppData\Local\Temp\cubaris.exe" C:\Users\admin\AppData\Local\Temp\cubaris.exe
cubaris.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\cubaris.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
29 161
Read events
29 161
Write events
0
Delete events
0

Modification events

No data
Executable files
18
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\_lzma.pydexecutable
MD5:77B78B43D58FE7CE9EB2FBB1420889FA
SHA256:6E571D93CE55D09583EC91C607883A43C1DA3D4D36794D68C6ECD6BEA4AB466A
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\Pythonwin\win32ui.pydexecutable
MD5:73925CDB0FB73121F5B020ED18007D0E
SHA256:8F76EE2BE223A57D477B10CC4109FA4D29A2B724D386AC3D71C237CF7B4B8520
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\libssl-1_1.dllexecutable
MD5:DE72697933D7673279FB85FD48D1A4DD
SHA256:ED1C8769F5096AFD000FC730A37B11177FCF90890345071AB7FBCEAC684D571F
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\VCRUNTIME140.dllexecutable
MD5:F34EB034AA4A9735218686590CBA2E8B
SHA256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\base_library.zipcompressed
MD5:B694BDA60770A7ED7EF2715DD1894CA9
SHA256:392760A1DA9C380316E25A4671563CA98A8F10B074B56948C54F6C003E16A5BB
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\_decimal.pydexecutable
MD5:FF0BF710EB2D7817C49E1F4E21502073
SHA256:C6EB532DA62A115AE75F58766B632E005140A2E7C9C67A77564F1804685A377F
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\_hashlib.pydexecutable
MD5:69DC506CF2FA3DA9D0CABA05FCA6A35D
SHA256:C5B8C4582E201FEF2D8CB2C8672D07B86DEC31AFB4A17B758DBFB2CFF163B12F
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\libcrypto-1_1.dllexecutable
MD5:AB01C808BED8164133E5279595437D3D
SHA256:9C0A0A11629CCED6A064932E95A0158EE936739D75A56338702FED97CB0BAD55
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\python39.dllexecutable
MD5:2135DA9F78A8EF80850FA582DF2C7239
SHA256:324963A39B8FD045FF634BB3271508DAB5098B4D99E85E7648D0B47C32DC85C3
4328cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI43282\unicodedata.pydexecutable
MD5:3BA2A20DDA6D1B4670767455BBE32870
SHA256:3A0987025F1CF2111DC6E4F59402073BA123D7436D809EE4198B4E7BFB8CB868
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
42
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
204
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
204
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5112
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5112
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2144
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
204
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
204
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2.23.209.179:443
Akamai International B.V.
GB
unknown
4804
cubaris.exe
140.82.121.3:443
github.com
GITHUB
US
shared
4804
cubaris.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
shared
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
2.23.209.177:443
Akamai International B.V.
GB
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 142.250.185.206
whitelisted
github.com
  • 140.82.121.3
shared
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
shared
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.136
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.140
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 23.52.181.141
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info