File name:

PK SEARCH PRIVATE.exe

Full analysis: https://app.any.run/tasks/038a3d70-b690-433c-b68d-bc4d59e83fc6
Verdict: Malicious activity
Analysis date: August 09, 2024, 04:17:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

02FCB926B39E8BFF8EBB5B2CAFA17900

SHA1:

ED2D224E97D185DA0287B16DF2571A440251365A

SHA256:

9620E628CA8333B95ADEF7B2442383F2E2981B979B301AA353148851079338F7

SSDEEP:

98304:ugIZngLSL8+jzLQ9ccUmYoJw/l7YhRuMm6JVgH4tMqswIZBjn3rXgplC9iaIuwpY:ylQNHBmp4IZQURO7FPw76vU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • PK SEARCH PRIVATE.exe (PID: 6292)
    • Process drops legitimate windows executable

      • PK SEARCH PRIVATE.exe (PID: 6292)
    • Loads Python modules

      • PK SEARCH PRIVATE.exe (PID: 7016)
    • Starts CMD.EXE for commands execution

      • PK SEARCH PRIVATE.exe (PID: 7016)
    • The process drops C-runtime libraries

      • PK SEARCH PRIVATE.exe (PID: 6292)
    • Connects to unusual port

      • PK SEARCH PRIVATE.exe (PID: 7016)
    • Executable content was dropped or overwritten

      • PK SEARCH PRIVATE.exe (PID: 6292)
    • Process drops python dynamic module

      • PK SEARCH PRIVATE.exe (PID: 6292)
    • Drops the executable file immediately after the start

      • PK SEARCH PRIVATE.exe (PID: 6292)
  • INFO

    • Checks supported languages

      • TextInputHost.exe (PID: 6552)
      • PK SEARCH PRIVATE.exe (PID: 6292)
      • PK SEARCH PRIVATE.exe (PID: 7016)
    • Reads the computer name

      • TextInputHost.exe (PID: 6552)
      • PK SEARCH PRIVATE.exe (PID: 7016)
      • PK SEARCH PRIVATE.exe (PID: 6292)
    • Create files in a temporary directory

      • PK SEARCH PRIVATE.exe (PID: 6292)
    • PyInstaller has been detected (YARA)

      • PK SEARCH PRIVATE.exe (PID: 6292)
      • PK SEARCH PRIVATE.exe (PID: 7016)
    • Checks operating system version

      • PK SEARCH PRIVATE.exe (PID: 7016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:09:29 13:37:11+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.35
CodeSize: 171520
InitializedDataSize: 364032
UninitializedDataSize: -
EntryPoint: 0xb750
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT pk search private.exe conhost.exe no specs textinputhost.exe no specs THREAT pk search private.exe cmd.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5880C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exePK SEARCH PRIVATE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5900C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6292"C:\Users\admin\Desktop\PK SEARCH PRIVATE.exe" C:\Users\admin\Desktop\PK SEARCH PRIVATE.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\pk search private.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exePK SEARCH PRIVATE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6552"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
7016"C:\Users\admin\Desktop\PK SEARCH PRIVATE.exe" C:\Users\admin\Desktop\PK SEARCH PRIVATE.exe
PK SEARCH PRIVATE.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\pk search private.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 950
Read events
1 950
Write events
0
Delete events
0

Modification events

No data
Executable files
58
Suspicious files
1
Text files
920
Unknown types
2

Dropped files

PID
Process
Filename
Type
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:F4678A746EE38334F65ABE420062BFAA
SHA256:77B0DF8AB1BEB56C5CB2C21A27416219C77F8FF1D58E07F1420843C2E3BEB2E9
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\_decimal.pydexecutable
MD5:BE315973AFF9BDEB06629CD90E1A901F
SHA256:0F9C6CC463611A9B2C692382FE1CDD7A52FEA4733FFAF645D433F716F8BBD725
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:451D756BACEE4885AE059E466779B097
SHA256:728CC9C30BFA035E1F17EBEDE9F42437BF75807CAFC088834F49DF05D47F8651
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:EEFCB4A90A0F0C16E98E135CD0B8CFAB
SHA256:562C2BD5CC8F1F0D9EE0D74F8B299538417216178BCE51876BCEDF95D510D33A
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\VCRUNTIME140.dllexecutable
MD5:49C96CECDA5C6C660A107D378FDFC3D4
SHA256:69320F278D90EFAAEB67E2A1B55E5B0543883125834C812C8D9C39676E0494FC
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:24DC4BBBC3B4903DBE54E6ADE18F67F0
SHA256:1FFA497730822BDB9948C93841BB3CDD2A62D4FDFC22BFD7BA19EC6607A7A656
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:84398CB4FA206939E4E0FBC186954776
SHA256:853C4D3DA01987406FE31553373E21F84EDBE617E47AB4930F7EADB67F761462
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:D652FF68C59F974201BBAD6EB0353AE4
SHA256:849A7C073A986C470AC0A7C4AD25C243C276C65CEE010830B3B061599F7FBF9C
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:FB4DBB2F9CE4EEE098149EE4C667F74F
SHA256:BF716016777A306AE35A1C7DEC592B7B9A603320CB0A69764AC34A7B00D75AD2
6292PK SEARCH PRIVATE.exeC:\Users\admin\AppData\Local\Temp\_MEI62922\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:C7F733D2DD69188D018F6491D30C56AA
SHA256:D7FBFDA276687A6D60D1FEDFF8A4B6C4F62428E7939F08C3AD83C91A8E63A019
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
46
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3900
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3900
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6648
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6692
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4708
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4084
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
4708
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5336
SearchApp.exe
2.23.209.182:443
www.bing.com
Akamai International B.V.
GB
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3900
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 2.23.209.182
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.179
  • 2.23.209.187
  • 2.23.209.140
  • 2.23.209.149
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.68
  • 40.126.32.72
  • 20.190.160.20
  • 40.126.32.138
  • 20.190.160.22
  • 20.190.160.17
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
th.bing.com
  • 202.89.233.101
  • 202.89.233.100
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted

Threats

No threats detected
No debug info