File name:

t.exe

Full analysis: https://app.any.run/tasks/11c2ae70-c936-4ec3-9804-d95071fd2cbd
Verdict: Malicious activity
Analysis date: May 13, 2025, 18:29:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

05F2CAA03D965D5A9D00BEFE6F29E538

SHA1:

C48615A5FF0E6812A432FBA0B464D12C0B886305

SHA256:

65C04AADAB715D8DFAC3A4F5EEA780BC2984FA3C4DB7DD13CEA8F05DF0AEFD58

SSDEEP:

98304:GKCCxu7ZyqLoxTMjjZwhqbeATQchet9WkAQItuK/JVKHrioMs8MzowjRkKoy4PQn:C7l06/s6I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
    • There is functionality for taking screenshot (YARA)

      • t.exe (PID: 2236)
      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
    • Application launched itself

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
    • Process drops legitimate windows executable

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
    • Loads Python modules

      • t.exe (PID: 2236)
      • t.exe (PID: 3880)
      • t.exe (PID: 704)
    • Executable content was dropped or overwritten

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
    • The process drops C-runtime libraries

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
  • INFO

    • Checks supported languages

      • t.exe (PID: 2236)
      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 3880)
      • t.exe (PID: 1548)
      • t.exe (PID: 704)
    • The sample compiled with english language support

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
    • PyInstaller has been detected (YARA)

      • t.exe (PID: 1964)
      • t.exe (PID: 2236)
      • t.exe (PID: 2960)
    • Create files in a temporary directory

      • t.exe (PID: 2960)
      • t.exe (PID: 1964)
      • t.exe (PID: 1548)
    • Reads the computer name

      • t.exe (PID: 1964)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
    • Manual execution by a user

      • explorer.exe (PID: 2272)
      • t.exe (PID: 2960)
      • t.exe (PID: 1548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (50.1)
.exe | Win64 Executable (generic) (32.2)
.dll | Win32 Dynamic Link Library (generic) (7.6)
.exe | Win32 Executable (generic) (5.2)
.exe | Generic Win/DOS Executable (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:13 18:28:07+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.43
CodeSize: 162816
InitializedDataSize: 143872
UninitializedDataSize: -
EntryPoint: 0xcaa0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
7
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start t.exe t.exe explorer.exe no specs t.exe t.exe t.exe t.exe

Process information

PID
CMD
Path
Indicators
Parent process
704"C:\Users\admin\Downloads\t.exe" C:\Users\admin\Downloads\t.exe
t.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\downloads\t.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
1548"C:\Users\admin\Downloads\t.exe" C:\Users\admin\Downloads\t.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\downloads\t.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
1964"C:\Users\admin\Downloads\t.exe" C:\Users\admin\Downloads\t.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\downloads\t.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2236"C:\Users\admin\Downloads\t.exe" C:\Users\admin\Downloads\t.exe
t.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\downloads\t.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2272"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2960"C:\Users\admin\Downloads\t.exe" C:\Users\admin\Downloads\t.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\downloads\t.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
3880"C:\Users\admin\Downloads\t.exe" C:\Users\admin\Downloads\t.exe
t.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\downloads\t.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
Total events
174
Read events
174
Write events
0
Delete events
0

Modification events

No data
Executable files
29
Suspicious files
699
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\VCRUNTIME140.dllexecutable
MD5:1A84957B6E681FCA057160CD04E26B27
SHA256:9FAEAA45E8CC986AF56F28350B38238B03C01C355E9564B849604B8D690919C5
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_bootlocale.pycbinary
MD5:4C0AAE28945D5B73F49C7CD73F0EC896
SHA256:3F307C14EA872D737BEA625EDAEE2CA57130557C35D18ACD81CCB1136F78681D
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_decimal.pydexecutable
MD5:327BB8AD9E4E30C079C184B960E747F8
SHA256:382AD65BE697BCCCE12B0826C2601BA05E45D936651BA834B545B3D7261D2A87
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_compression.pycbinary
MD5:8E3CC75502E54444740C6124977B76C8
SHA256:52A28668D2EB543DF48A84B70AD0D07D8739D4D63F28287A97C879EB4B1CA989
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_hashlib.pydexecutable
MD5:23DBE8A452F43C2ACDF0B3E218CDBD9A
SHA256:205D849071DC8039755E8E37679B09D736D6F1F65B0367762B1E50BBA5AE7D07
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_compat_pickle.pycbinary
MD5:9011EA491B910E5F7C9DF3D698860F22
SHA256:776D9C536C1BCECB8C2BF605FBB2E327631D2EFEEC529E02B172CF85D3227519
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_collections_abc.pycbinary
MD5:E5B16A015424401D611F329E238E46A3
SHA256:AA07F621E3ED78D27E2E8A5DAFCC1D099565006D2E9384C4533A66AD76EE0267
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\_strptime.pycbinary
MD5:DA7FE694A76EB95AD074EB183C8380D0
SHA256:282062F886327E11E331BAEB57A6B77DA3736AEFD54F7D2BA119F11069CC2A76
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\base64.pycbinary
MD5:47EE11849A21A461848CDA2D4F69BC6F
SHA256:A233FD1B979B4F2AAEA8770A1B75364E1304B3EB6019D4AFAFF2D751A127F223
1964t.exeC:\Users\admin\AppData\Local\Temp\_MEI19642\argparse.pycbinary
MD5:187376EB453BF738634472E70BB794A6
SHA256:31DC6854A6A6C7068A58EE199ED89CD5B966EA7D7E7F9E28FC3850D0314D30DC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted

Threats

No threats detected
Process
Message
t.exe
[PYI-1964:DEBUG] LOADER: archive file: C:\Users\admin\Downloads\t.exe
t.exe
[PYI-1964:DEBUG] LOADER: process level = 0
t.exe
[PYI-1964:DEBUG] LOADER: attempting to open archive C:\Users\admin\Downloads\t.exe
t.exe
[PYI-1964:DEBUG] LOADER: creating temporary directory (runtime_tmpdir=(null))...
t.exe
[PYI-1964:DEBUG] LOADER: executable file: C:\Users\admin\Downloads\t.exe
t.exe
[PYI-1964:DEBUG] LOADER: initializing security descriptor from string: D:(A;;FA;;;S-1-5-21-1302019708-1500728564-335382590-1000)
t.exe
[PYI-1964:DEBUG] LOADER: argv[0]: C:\Users\admin\Downloads\t.exe
t.exe
[PYI-1964:DEBUG] LOADER: trying to load executable-embedded archive...
t.exe
[PYI-1964:DEBUG] LOADER: this is parent process of onefile application.
t.exe
[PYI-1964:DEBUG] LOADER: attempting to create temporary application directory under C:\Users\admin\AppData\Local\Temp\