File name:

CookiesGrabber.exe

Full analysis: https://app.any.run/tasks/448bf825-a689-44ce-b349-3d74c7350dc4
Verdict: Malicious activity
Analysis date: June 21, 2025, 20:29:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

1099BAA9E7504DFFE917EEB846C16943

SHA1:

F69FDF685BC0A2F51ACEAFE516579C50BC830330

SHA256:

B513572FBC4154717C723D52DD793C413D98EF370EFB050FF800A89C8DCD15C4

SSDEEP:

98304:zD/lCFXRRdopaZOl/QOsIgMb1mB75kzlUzUjGNgLN71bxelLb/ncfNAnYRO4Y6Zd:GJG93881mwe/kiPNAnQBI1G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CookiesGrabber.exe (PID: 7048)
    • Process drops python dynamic module

      • CookiesGrabber.exe (PID: 7048)
    • Application launched itself

      • CookiesGrabber.exe (PID: 7048)
    • The process drops C-runtime libraries

      • CookiesGrabber.exe (PID: 7048)
    • Reads browser cookies

      • CookiesGrabber.exe (PID: 6868)
    • Process drops legitimate windows executable

      • CookiesGrabber.exe (PID: 7048)
    • Loads Python modules

      • CookiesGrabber.exe (PID: 6868)
  • INFO

    • Checks supported languages

      • CookiesGrabber.exe (PID: 7048)
      • CookiesGrabber.exe (PID: 6868)
    • Reads the computer name

      • CookiesGrabber.exe (PID: 7048)
      • CookiesGrabber.exe (PID: 6868)
    • Create files in a temporary directory

      • CookiesGrabber.exe (PID: 7048)
    • The sample compiled with english language support

      • CookiesGrabber.exe (PID: 7048)
    • Creates files or folders in the user directory

      • CookiesGrabber.exe (PID: 6868)
    • Reads the software policy settings

      • slui.exe (PID: 3740)
    • Checks proxy server information

      • slui.exe (PID: 3740)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:21 18:25:10+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 179712
InitializedDataSize: 155136
UninitializedDataSize: -
EntryPoint: 0xc650
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cookiesgrabber.exe conhost.exe no specs cookiesgrabber.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
768\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCookiesGrabber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3740C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6868"C:\Users\admin\Desktop\CookiesGrabber.exe" C:\Users\admin\Desktop\CookiesGrabber.exeCookiesGrabber.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cookiesgrabber.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7048"C:\Users\admin\Desktop\CookiesGrabber.exe" C:\Users\admin\Desktop\CookiesGrabber.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cookiesgrabber.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 679
Read events
3 679
Write events
0
Delete events
0

Modification events

No data
Executable files
69
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_raw_ofb.pydexecutable
MD5:A2B9F1DB81EE431F07A848F44153518F
SHA256:CD11346BDC23F15D68701C3F602B621BB7C93CF1AAA193FF079225603514122D
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_raw_ecb.pydexecutable
MD5:B9F8151C65BDAF81BF9407A32E77959B
SHA256:ED154E6C22235659E57532B0A8B3CD7A081603C6CAE9CB165E436006881C1C74
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Hash\_BLAKE2b.pydexecutable
MD5:7FCAD6D233F8F41636258C970390284C
SHA256:E0D97FD22D02BE38357905F8D833E1CD78839EDF986692EDE944F9EE0CEE8B40
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_raw_des3.pydexecutable
MD5:494239F9453679D80511BECC23C6B621
SHA256:9C849A1DD641A3143C25B261E18D8F1453B00BB975E324384F15311C1B544F3D
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Hash\_BLAKE2s.pydexecutable
MD5:EFB1F498321597F1AAF7FB6A57603C76
SHA256:2A8CA6C6E864F0F5DE6E22736D461AEC5AFA45B4CB77449731AFC0861C20C23D
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_raw_arc2.pydexecutable
MD5:530BB99610B35527C3B06A22FD92CCEC
SHA256:43BC2F864D062BF7FE940E9CC497EF4FDFCC6EAEAB95FD4D4EE837E4D5DE0437
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_raw_ctr.pydexecutable
MD5:3D0FB2250C76B501ABF008D8E6180594
SHA256:E5E2B54591D4CA2DC43F6D0FFDBFF45393D092E9E37C072FFE7B8769EEC3B82E
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_raw_blowfish.pydexecutable
MD5:403A4F70938F58C15DAEB4A63D7ECADB
SHA256:FB407812E3E4D17B2CA981C8B95C716FF1B288A5E4658A831CD067A2837A753B
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_ARC4.pydexecutable
MD5:EFF0F16D6E853EA2CBC7B3BCAB5E0591
SHA256:9892A83A3E511BD1024BFCCE460DBDE2690FD2A3C0C449081950C40EFDBA4C7D
7048CookiesGrabber.exeC:\Users\admin\AppData\Local\Temp\_MEI70482\Crypto\Cipher\_Salsa20.pydexecutable
MD5:17C99EDF022309BC2C54A732FB8FBF26
SHA256:34EB9C505180358711D8D6268E3F0E700C58AC9F47B0AD68565ED73BAB5DBD81
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
36
TCP/UDP connections
51
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
184.25.50.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3588
RUXIMICS.exe
GET
200
184.25.50.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.25.50.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
40.126.32.136:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
20.190.160.17:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
20.190.160.5:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
GET
200
20.3.187.198:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
5504
SIHClient.exe
GET
200
184.25.50.10:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3588
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
184.25.50.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
184.25.50.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3588
RUXIMICS.exe
184.25.50.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 184.25.50.10
  • 184.25.50.8
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.132
  • 20.190.160.4
  • 40.126.32.134
  • 20.190.160.65
  • 20.190.160.67
  • 40.126.32.74
  • 20.190.160.22
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.21
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.249
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info