File name:

labelImg.exe

Full analysis: https://app.any.run/tasks/4b4e6ca0-661a-4543-8a00-46f766f1a4df
Verdict: Malicious activity
Analysis date: November 25, 2024, 01:52:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 4 sections
MD5:

2265CE694442C118F5543689C8C61ECB

SHA1:

1D88F572DBAC54087F6D068E748FF82CC2483763

SHA256:

A288A77ED0D69AFE9F9128EC02760702BEB8E59665001AFCD92FF308423CAB83

SSDEEP:

98304:15/z/wx5NNhJAl4RcCjQvHI3WPY5Site9sn9DD5qy8qTd8E6XzQKy6NIuxmffUxU:ZJbRybZw80NHsm48CXmgtkzfQK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • labelImg.exe (PID: 1544)
    • Application launched itself

      • labelImg.exe (PID: 2796)
    • Process drops python dynamic module

      • labelImg.exe (PID: 2796)
    • Executable content was dropped or overwritten

      • labelImg.exe (PID: 2796)
  • INFO

    • Drops encrypted VBS script (Microsoft Script Encoder)

      • labelImg.exe (PID: 1544)
    • Create files in a temporary directory

      • labelImg.exe (PID: 2796)
    • Checks supported languages

      • labelImg.exe (PID: 1544)
      • labelImg.exe (PID: 2796)
    • Reads the computer name

      • labelImg.exe (PID: 1544)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:03:23 22:26:54+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 105472
InitializedDataSize: 128512
UninitializedDataSize: -
EntryPoint: 0xb2f7
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start labelimg.exe conhost.exe no specs labelimg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1544"C:\Users\admin\AppData\Local\Temp\labelImg.exe" C:\Users\admin\AppData\Local\Temp\labelImg.exelabelImg.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\labelimg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
2796"C:\Users\admin\AppData\Local\Temp\labelImg.exe" C:\Users\admin\AppData\Local\Temp\labelImg.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\labelimg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
5720\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exelabelImg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 931
Read events
4 833
Write events
93
Delete events
5

Modification events

(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qgif4.dll
Value:
40807
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qgif4.dll
Value:
2024-11-25T01:52:43
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qico4.dll
Value:
40807
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qico4.dll
Value:
2024-11-25T01:52:43
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qjpeg4.dll
Value:
40807
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qjpeg4.dll
Value:
2024-11-25T01:52:43
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qmng4.dll
Value:
40807
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qmng4.dll
Value:
2024-11-25T01:52:43
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qsvg4.dll
Value:
40807
(PID) Process:(1544) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\imageformats
Operation:writeName:qtga4.dll
Value:
40807
Executable files
34
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\select.pydexecutable
MD5:4F1C033A4B8B1BC19565A78655C0E385
SHA256:029D60725554EF87BF13C667B01AD32159DD2852FACA43F3A81D71D0062A3A33
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\win32pipe.pydexecutable
MD5:E1F9FC63175A0E6799CBB58A094A80FA
SHA256:955E1A98D2DDCAA64ACF4E47135434E6557427B52D6BAC59AAAE2DAFEA463CD3
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\_ssl.pydexecutable
MD5:6F47CDDCC5C74CF22A1B5CF710935EBF
SHA256:D9FADB044CA15EE133F157180197F6867FE21D03FB3A4F601A6F356150F1D08D
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\bz2.pydexecutable
MD5:A9445508C595C742D93B473B1DB1758C
SHA256:E9E06E0D6E4B9B3486EB0E100C35B13C90A92864305CDE9E6DAEA74CFF7722CD
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\unicodedata.pydexecutable
MD5:B4530ADC9CBA15114A001D1AAE2E98B3
SHA256:C7C85F717B8A3676716BB2106E31B288EA1DFE90D1802180169CF92488F47DDE
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\codecs\qkrcodecs4.dllexecutable
MD5:8A4AC179E4BEAE544712414707D9DBC3
SHA256:E76FD99799D5FE8F247D3026BF05966B93941358CBE404A546DAB30356D215CF
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\codecs\qjpcodecs4.dllexecutable
MD5:875A260560C78F5DAB835AB84A3DC2ED
SHA256:1896B90FAB05A0C9D53D3B2D954728B99903FD29D466401FC8948AB07135B413
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\_hashlib.pydexecutable
MD5:3C58062B89379F2D29A12BFFD3D01AF8
SHA256:706BEBA9F66B1422AC45F35E9094846F1E6E76CF1120FCAB0835EA6BE4236B61
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\qt4_plugins\codecs\qtwcodecs4.dllexecutable
MD5:9E9B14FA5F128FA430ED5DB8EB54BC66
SHA256:C88312ACA69A0F43CB1C81A0582C8077BDB6D95E5DEB72E5F6A147D0C4DAB11E
2796labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI27962\pyexpat.pydexecutable
MD5:67DA26AED9CBD7FCEBE9F7B8CE0A6448
SHA256:0B7FC6F03587372C01F717F9B63B646AD2F6E18D139B792921399B4CEF0B65E1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4076
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1448
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1448
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6092
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.131:443
www.bing.com
Akamai International B.V.
DE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.129
  • 104.126.37.155
  • 104.126.37.171
  • 104.126.37.130
  • 104.126.37.139
  • 104.126.37.144
  • 104.126.37.136
  • 104.126.37.145
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.68
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.76
  • 20.190.160.14
  • 40.126.32.136
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info