File name:

fat.exe

Full analysis: https://app.any.run/tasks/de797838-671a-4d5e-81c9-abe379ad0822
Verdict: Malicious activity
Analysis date: June 02, 2025, 20:44:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

D3C2519A4B1A0FCAA544ACC0811F5C1B

SHA1:

338E88EC41BD6AF415397343A193E27E336DDD90

SHA256:

944A080711C209D86728FF347A9A6B017B89EFA59CA2F6B7FE9CCF511EC5FD6A

SSDEEP:

196608:Z8owhBiCWMG+A7q/TIqd6ERJO9WxPHEB3hphGLSiJ:ZevWJzq/jUaPI4Sk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Loads Python modules

      • fat.exe (PID: 680)
    • Application launched itself

      • fat.exe (PID: 4400)
    • The process drops C-runtime libraries

      • fat.exe (PID: 4400)
    • Process drops legitimate windows executable

      • fat.exe (PID: 4400)
    • Executable content was dropped or overwritten

      • fat.exe (PID: 4400)
    • Process drops python dynamic module

      • fat.exe (PID: 4400)
    • Starts CMD.EXE for commands execution

      • fat.exe (PID: 680)
    • Checks for external IP

      • fat.exe (PID: 680)
  • INFO

    • Reads the computer name

      • fat.exe (PID: 4400)
      • fat.exe (PID: 680)
    • Checks supported languages

      • fat.exe (PID: 4400)
      • fat.exe (PID: 680)
    • Create files in a temporary directory

      • fat.exe (PID: 4400)
      • fat.exe (PID: 680)
    • The sample compiled with english language support

      • fat.exe (PID: 4400)
    • Reads the machine GUID from the registry

      • fat.exe (PID: 680)
    • Checks operating system version

      • fat.exe (PID: 680)
    • Checks proxy server information

      • fat.exe (PID: 680)
      • slui.exe (PID: 3268)
    • Reads the software policy settings

      • slui.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:01 23:37:27+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.32
CodeSize: 165888
InitializedDataSize: 154112
UninitializedDataSize: -
EntryPoint: 0xafa0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start fat.exe fat.exe cmd.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Users\admin\Desktop\fat.exe" C:\Users\admin\Desktop\fat.exe
fat.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\fat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
780\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3268C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4400"C:\Users\admin\Desktop\fat.exe" C:\Users\admin\Desktop\fat.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\fat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7812C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exefat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
Total events
6 649
Read events
6 649
Write events
0
Delete events
0

Modification events

No data
Executable files
93
Suspicious files
2
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_ARC4.pydexecutable
MD5:BB24C0130C3DDC0EDD8ED9445CD139DD
SHA256:EC06CBEAD433D7E91947E2C66E9DDD3BC319C3A8D7F6A75CCA782ED3BB3BAE76
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_cbc.pydexecutable
MD5:B1A7FF8D600A4AFA51E63A294AAD3644
SHA256:3176B78C6DC07BC119D0E59E23F3DEA732E606E876D36F9224C6D15D7A7B39A4
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_des.pydexecutable
MD5:D396715DE12BAD1416F4E3CCFB7FA6BD
SHA256:E0ABA48F05288315674C3667E3C883A1D2AF7813A58838B007C6CA6463D39471
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_chacha20.pydexecutable
MD5:CF8FFD1342F25DC21DA26EFE0F9BFD5C
SHA256:06B6F6005B96FA3DDBFFA052CD11B9870101064225AE21258030A8B0C5A9495B
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_cast.pydexecutable
MD5:83E114861F490D23DE2B3CA29A536C28
SHA256:23C0B7775AAE008895DCA6F0E0E261386053237926AD4C9A88835525ECB53498
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_ctr.pydexecutable
MD5:B883A25430F149C19633E54500251F8E
SHA256:61C08CAC2CEEF0A61E5EC0D34C4AA20F3BF24F19D95F60D95A36F31BC4ABE77F
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_des3.pydexecutable
MD5:46119999FDE46D664919CD9806A90160
SHA256:37CB14308EDDA8B2F070EBC47B470B44E415721337AEA8D2CF68A39A8A5CF543
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Hash\_BLAKE2b.pydexecutable
MD5:CDE2EB550754737B0761D0F7B9A1A722
SHA256:5190424067BA6ABF66FCD5263274C920B5B55383DBA71A8E13CEC9E2ABD8ECD9
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_ecb.pydexecutable
MD5:8FBD630F47859399EE7E5CE10265B5F4
SHA256:E7B302DA7D6CDF5249EDA13D43E999253C7F0F2E5FCB0E5513E8ECC5811C6D26
4400fat.exeC:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_blowfish.pydexecutable
MD5:A198952267D13A7B0360560F8FBF155B
SHA256:9CB5C5CF5D1677552B3A4CDBA1069F4D51C4D3F2F4D36E6EEFB72FC6B20AC178
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
21
DNS requests
7
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8172
RUXIMICS.exe
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8172
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
8172
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
8172
RUXIMICS.exe
2.18.121.139:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
8172
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
680
fat.exe
172.67.74.152:443
api.ipify.org
CLOUDFLARENET
US
shared
7676
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3268
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 172.217.16.142
whitelisted
crl.microsoft.com
  • 2.18.121.139
  • 2.18.121.147
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
api.ipify.org
  • 172.67.74.152
  • 104.26.12.205
  • 104.26.13.205
shared
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
self.events.data.microsoft.com
  • 52.168.117.168
whitelisted

Threats

PID
Process
Class
Message
680
fat.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
No debug info