File name:

1 (1452)

Full analysis: https://app.any.run/tasks/a9c7bc6d-0b55-4d75-bea0-3ed17bc548b3
Verdict: Malicious activity
Analysis date: March 24, 2025, 13:48:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

E669B6F9108515CA4CE37D55FF89E3C0

SHA1:

CF0DFF950A1A603BE5227CB60CA43B6009A10837

SHA256:

ACEA317CF344007DF1C3ED667D623B8BF7A6EA1E95A772D756A9212661289605

SSDEEP:

98304:dUHFNhLtg3RfOFOp3ZyUuYA3w3eEBe/q1s77w4xCTwCMvYK+vS2XbBVlWRplU9ac:okztwGWR5Gj4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • 1 (1452).exe (PID: 4220)
    • Process drops python dynamic module

      • 1 (1452).exe (PID: 4220)
    • Executable content was dropped or overwritten

      • 1 (1452).exe (PID: 4220)
    • Process drops legitimate windows executable

      • 1 (1452).exe (PID: 4220)
    • The process drops C-runtime libraries

      • 1 (1452).exe (PID: 4220)
    • Loads Python modules

      • 1 (1452).exe (PID: 5256)
    • Connects to unusual port

      • 1 (1452).exe (PID: 5256)
    • There is functionality for taking screenshot (YARA)

      • 1 (1452).exe (PID: 4220)
      • 1 (1452).exe (PID: 5256)
  • INFO

    • Reads the computer name

      • 1 (1452).exe (PID: 5256)
      • 1 (1452).exe (PID: 4220)
    • Reads the machine GUID from the registry

      • 1 (1452).exe (PID: 5256)
    • Create files in a temporary directory

      • 1 (1452).exe (PID: 4220)
    • Checks supported languages

      • 1 (1452).exe (PID: 5256)
      • 1 (1452).exe (PID: 4220)
    • The sample compiled with english language support

      • 1 (1452).exe (PID: 4220)
    • Checks proxy server information

      • 1 (1452).exe (PID: 5256)
    • PyInstaller has been detected (YARA)

      • 1 (1452).exe (PID: 4220)
      • 1 (1452).exe (PID: 5256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:03:16 10:34:30+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 171520
InitializedDataSize: 155136
UninitializedDataSize: -
EntryPoint: 0xc1f0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 1 (1452).exe 1 (1452).exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2644C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4220"C:\Users\admin\AppData\Local\Temp\1 (1452).exe" C:\Users\admin\AppData\Local\Temp\1 (1452).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\1 (1452).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5256"C:\Users\admin\AppData\Local\Temp\1 (1452).exe" C:\Users\admin\AppData\Local\Temp\1 (1452).exe
1 (1452).exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\1 (1452).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5324"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5680C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
772
Read events
772
Write events
0
Delete events
0

Modification events

No data
Executable files
16
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_ssl.pydexecutable
MD5:11C5008E0BA2CAA8ADF7452F0AAAFD1E
SHA256:BF63F44951F14C9D0C890415D013276498D6D59E53811BBE2FA16825710BEA14
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_queue.pydexecutable
MD5:C9EE37E9F3BFFD296ADE10A27C7E5B50
SHA256:9ECEC72C5FE3C83C122043CAD8CEB80D239D99D03B8EA665490BBCED183CE42A
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_bz2.pydexecutable
MD5:B45E82A398713163216984F2FEBA88F6
SHA256:4C2649DC69A8874B91646723AACB84C565EFEAA4277C46392055BCA9A10497A8
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\VCRUNTIME140.dllexecutable
MD5:11D9AC94E8CB17BD23DEA89F8E757F18
SHA256:E1D6F78A72836EA120BD27A33AE89CBDC3F3CA7D9D0231AAA3AAC91996D2FA4E
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\base_library.zipcompressed
MD5:7B2903144D2AB90E0E8C34C0C5FC8B30
SHA256:76F8CFFF0CA0997BA4FEAD6D7883316F32688CB9872A86DF23148CD94C1511B2
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_lzma.pydexecutable
MD5:5A77A1E70E054431236ADB9E46F40582
SHA256:F125A885C10E1BE4B12D988D6C19128890E7ADD75BAA935FE1354721AA2DEA3E
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_hashlib.pydexecutable
MD5:CFB9E0A73A6C9D6D35C2594E52E15234
SHA256:50DAEB3985302A8D85CE8167B0BF08B9DA43E7D51CEAE50E8E1CDFB0EDF218C6
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\libcrypto-1_1.dllexecutable
MD5:63C4F445B6998E63A1414F5765C18217
SHA256:664C3E52F914E351BB8A66CE2465EE0D40ACAB1D2A6B3167AE6ACF6F1D1724D2
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_decimal.pydexecutable
MD5:1CDD7239FC63B7C8A2E2BC0A08D9EA76
SHA256:384993B2B8CFCBF155E63F0EE2383A9F9483DE92AB73736FF84590A0C4CA2690
42201 (1452).exeC:\Users\admin\AppData\Local\Temp\_MEI42202\select.pydexecutable
MD5:78D421A4E6B06B5561C45B9A5C6F86B1
SHA256:F1694CE82DA997FAA89A9D22D469BFC94ABB0F2063A69EC9B953BC085C2CB823
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
26
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1072
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4040
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4040
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5256
1 (1452).exe
193.222.96.146:8888
Amirhossein Noori Latif
US
unknown
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1072
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.177
  • 23.48.23.147
  • 23.48.23.173
  • 23.48.23.164
  • 23.48.23.156
  • 23.48.23.180
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.64
  • 40.126.31.3
  • 40.126.31.0
  • 40.126.31.131
  • 40.126.31.67
  • 40.126.31.129
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info