| File name: | unnatty-detector.exe |
| Full analysis: | https://app.any.run/tasks/6e8819cc-de5c-4bb3-82c5-21cd4b7a6d3e |
| Verdict: | Malicious activity |
| Analysis date: | December 08, 2024, 21:53:02 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 11 sections |
| MD5: | C457E96B88D39726226E1D352770C786 |
| SHA1: | 3FAF0A10636E5323B05C39D3F1735E3D669B54B2 |
| SHA256: | 5984962018AEA528C179B45F28519B0586379D1738A16B8887147E0C3F89DB99 |
| SSDEEP: | 98304:PO6J9mqXO76buTbZGMaYp7+3J1osffJCzS4fXpCyoXWMaYitGs6aN5EhNeRnGD8P:PnWGfs9ixhcYAKS2zWdADkfu |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:12:08 21:20:07+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.42 |
| CodeSize: | 133120 |
| InitializedDataSize: | 10253824 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xffe058 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | Oracle |
| ProductName: | Discord Hook Detector |
| FileDescription: | Discord Hook Detector |
| ProductVersion: | 1.0.0.0 |
| FileVersion: | 1.0.0.0 |
| OriginalFileName: | main.exe |
| InternalName: | main |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 4468 | C:\Users\admin\Desktop\unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\main.exe | unnatty-detector.exe | ||||||||||||
User: admin Company: Oracle Integrity Level: MEDIUM Description: Discord Hook Detector Version: 1.0.0.0 Modules
| |||||||||||||||
| 5628 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | unnatty-detector.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5712 | "C:\Users\admin\Desktop\unnatty-detector.exe" | C:\Users\admin\Desktop\unnatty-detector.exe | explorer.exe | ||||||||||||
User: admin Company: Oracle Integrity Level: MEDIUM Description: Discord Hook Detector Version: 1.0.0.0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\_elementtree.pyd | executable | |
MD5:048EA61F0C0F7FD42DFE8CA3203D5E99 | SHA256:9B9ABF5672BEC167B854A106EB25701433B34A0C877ED5E363202247E5BADA58 | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\_hashlib.pyd | executable | |
MD5:F377A418ADDEEB02F223F45F6F168FE6 | SHA256:9551431425E9680660C6BAF7B67A262040FD2EFCEB241E4C9430560C3C1FAFAC | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\_queue.pyd | executable | |
MD5:4AB2CEB88276EBA7E41628387EACB41E | SHA256:D82AB111224C54BAB3EEFDCFEB3BA406D74D2884518C5A2E9174E5C6101BD839 | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\_uuid.pyd | executable | |
MD5:C9D5A1A4B6186B5AD1242E6C5CCA31E5 | SHA256:EEC57D615873E2065ED83DA6164774B9396B4984AD39E1C2166F2C9B45626272 | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\_decimal.pyd | executable | |
MD5:CE4DF4DFE65AB8DC7AE6FCDEBAE46112 | SHA256:FFBE84F0A1EAB363CA9CF73EFB7518F2ABD52C0893C7CC63266613C930855E96 | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\libcrypto-1_1.dll | executable | |
MD5:CC4CBF715966CDCAD95A1E6C95592B3D | SHA256:594303E2CE6A4A02439054C84592791BF4AB0B7C12E9BBDB4B040E27251521F1 | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\select.pyd | executable | |
MD5:7A442BBCC4B7AA02C762321F39487BA9 | SHA256:1DD7BBA480E65802657C31E6D20B1346D11BCA2192575B45EB9760A4FEB468AD | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\python39.dll | executable | |
MD5:11C051F93C922D6B6B4829772F27A5BE | SHA256:0EABF135BB9492E561BBBC5602A933623C9E461ACEAF6EB1CECED635E363CD5C | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\libssl-1_1.dll | executable | |
MD5:BC778F33480148EFA5D62B2EC85AAA7D | SHA256:9D4CF1C03629F92662FC8D7E3F1094A7FC93CB41634994464B853DF8036AF843 | |||
| 5712 | unnatty-detector.exe | C:\Users\admin\AppData\Local\Temp\onefile_5712_133781683974854411\_socket.pyd | executable | |
MD5:F5DD9C5922A362321978C197D3713046 | SHA256:4494992665305FC9401ED327398EE40064FE26342FE44DF11D89D2AC1CC6F626 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2548 | svchost.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2548 | svchost.exe | GET | 200 | 23.48.23.177:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.177:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2548 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2548 | svchost.exe | 23.48.23.177:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.177:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2548 | svchost.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
raw.githubusercontent.com |
| shared |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |