File name:

audit1file.ex_

Full analysis: https://app.any.run/tasks/f3603195-d532-4eb3-9b79-e85c8a869642
Verdict: Malicious activity
Analysis date: May 15, 2025, 11:07:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

B87282457D70A04A939D85BC0D010307

SHA1:

F66E7F5A0600D008E918A2033CB8B2EC65A04A06

SHA256:

82CB3541248E67AC23B05AA6451BE8C0A3AD2150741C680F1ED1A92AE4E062F2

SSDEEP:

98304:xqfxOxmPbg9+d/FS9WSTWA34n3tKwEApJM6Gmkuhy3nU8qkSyfvt4Qne88+VQ5TB:yIyWtJa11QZnvJG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • audit1file.ex_.exe (PID: 7432)
    • The process drops C-runtime libraries

      • audit1file.ex_.exe (PID: 7432)
    • Executable content was dropped or overwritten

      • audit1file.ex_.exe (PID: 7432)
    • Process drops python dynamic module

      • audit1file.ex_.exe (PID: 7432)
    • There is functionality for taking screenshot (YARA)

      • audit1file.ex_.exe (PID: 7432)
    • Application launched itself

      • audit1file.ex_.exe (PID: 7432)
    • Loads Python modules

      • audit1file.ex_.exe (PID: 4776)
  • INFO

    • The sample compiled with english language support

      • audit1file.ex_.exe (PID: 7432)
    • Checks supported languages

      • audit1file.ex_.exe (PID: 7432)
      • audit1file.ex_.exe (PID: 4776)
    • Reads the computer name

      • audit1file.ex_.exe (PID: 7432)
      • audit1file.ex_.exe (PID: 4776)
    • Create files in a temporary directory

      • audit1file.ex_.exe (PID: 7432)
      • audit1file.ex_.exe (PID: 4776)
    • PyInstaller has been detected (YARA)

      • audit1file.ex_.exe (PID: 7432)
    • Reads the machine GUID from the registry

      • audit1file.ex_.exe (PID: 4776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (50.1)
.exe | Win64 Executable (generic) (32.2)
.dll | Win32 Dynamic Link Library (generic) (7.6)
.exe | Win32 Executable (generic) (5.2)
.exe | Generic Win/DOS Executable (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:18 09:52:16+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.36
CodeSize: 151552
InitializedDataSize: 104960
UninitializedDataSize: -
EntryPoint: 0xa510
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start audit1file.ex_.exe sppextcomobj.exe no specs slui.exe no specs audit1file.ex_.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4776"C:\Users\admin\AppData\Local\Temp\audit1file.ex_.exe" C:\Users\admin\AppData\Local\Temp\audit1file.ex_.exeaudit1file.ex_.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\audit1file.ex_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7432"C:\Users\admin\AppData\Local\Temp\audit1file.ex_.exe" C:\Users\admin\AppData\Local\Temp\audit1file.ex_.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\audit1file.ex_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7456C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7488"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 648
Read events
1 648
Write events
0
Delete events
0

Modification events

No data
Executable files
28
Suspicious files
6
Text files
920
Unknown types
0

Dropped files

PID
Process
Filename
Type
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_ctypes.pydexecutable
MD5:06C45D47AF92A68EA6DA0CC861992034
SHA256:B016E7CE9744A0E8FEA473F1982E5D2FC355A98682054F470F4189D5FC00B8BF
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\VCRUNTIME140.dllexecutable
MD5:AE96651CFBD18991D186A029CBECB30C
SHA256:1B372F064EACB455A0351863706E6326CA31B08E779A70DE5DE986B5BE8069A1
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_bz2.pydexecutable
MD5:055CFC5297933C338D8C04FD4E2462A2
SHA256:BEFC81440BBC001BD7647ACA42962EE0B45B08435EE9F7140BF570AF636B7DD5
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\python3.dllexecutable
MD5:51CACDECE9DA16B095BB06DAC8E04D5F
SHA256:6B2EE6ED6617753C8859E3C6FC7AF863843C6827045BE9F233AF8AE316418550
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_lzma.pydexecutable
MD5:D72665EA18965F103200CCC7AD072F85
SHA256:AB20E63D14259A7DECA85A068796476C0EFCC236A11D53B1816FC6F8956424A8
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_tkinter.pydexecutable
MD5:CA14F8ECEC66E86D206656CCDB7E9E50
SHA256:2AD4C0A6E125862880C5359FEE1F64DEAAB706498F92107C0F8F03654D8EC54C
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\libssl-1_1.dllexecutable
MD5:D07120C4A7F7FA74D9C774D81663D685
SHA256:96FECBEA2F57B69326EB2E0DCBA7C32A8AE1D281D85F52C32FC39D5D4CCA479B
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_decimal.pydexecutable
MD5:942849B267A15E74C43BC298CF8EFCA3
SHA256:749347C07F5DB9D5CD318313EBF120E541E12502710C27486047123E6E5D5AC4
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_hashlib.pydexecutable
MD5:1280A084744EF726A673B757B9364335
SHA256:C2B3DC92ABD96485032D1287941E405D56DF05FB5BA68199497D8594400163E5
7432audit1file.ex_.exeC:\Users\admin\AppData\Local\Temp\_MEI74322\_contextvars.pydexecutable
MD5:4A525F91513ECE5FE180A5D1123D8337
SHA256:6629835406814CD78D006A6080EFAF0E93E28B88B3FA2FEB00B7EF9C975E4A61
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.130
  • 40.126.32.136
  • 20.190.160.64
  • 20.190.160.17
  • 20.190.160.132
  • 20.190.160.4
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info