File name:

labelImg.exe

Full analysis: https://app.any.run/tasks/2944ce39-1fdb-4a9e-a46f-3b48d1859bdb
Verdict: Malicious activity
Analysis date: November 25, 2024, 01:58:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 4 sections
MD5:

0066DA200EAD7F1EB48693B1D5B2E064

SHA1:

4EDE2B1AC8BA806B4B95237E9774AEC4BFD8174B

SHA256:

C2477E9DAB909FF059BA9C028429C08C373579A4A0275262F75675F2C682A37B

SSDEEP:

98304:15/U/w15hV6zl4RGCjQvRIiWPE5Site9sn9DD5qy8qOd8E6XzQKyTNIuxmdfUxrQ:JhbRybZw80NHsm48CXmgtkzfQK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • labelImg.exe (PID: 4444)
    • Loads Python modules

      • labelImg.exe (PID: 2100)
    • Process drops python dynamic module

      • labelImg.exe (PID: 4444)
    • Application launched itself

      • labelImg.exe (PID: 4444)
  • INFO

    • Checks supported languages

      • labelImg.exe (PID: 2100)
      • labelImg.exe (PID: 4444)
    • Create files in a temporary directory

      • labelImg.exe (PID: 4444)
    • Reads the computer name

      • labelImg.exe (PID: 2100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:03:23 22:26:54+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 105472
InitializedDataSize: 128512
UninitializedDataSize: -
EntryPoint: 0xb2f7
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start labelimg.exe conhost.exe no specs labelimg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2100"C:\Users\admin\AppData\Local\Temp\labelImg.exe" C:\Users\admin\AppData\Local\Temp\labelImg.exelabelImg.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\labelimg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
3620\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exelabelImg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4444"C:\Users\admin\AppData\Local\Temp\labelImg.exe" C:\Users\admin\AppData\Local\Temp\labelImg.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\labelimg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
4 711
Read events
4 613
Write events
93
Delete events
5

Modification events

(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qgif4.dll
Value:
40807
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qgif4.dll
Value:
2024-11-25T01:58:33
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qico4.dll
Value:
40807
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qico4.dll
Value:
2024-11-25T01:58:33
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qjpeg4.dll
Value:
40807
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qjpeg4.dll
Value:
2024-11-25T01:58:33
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qmng4.dll
Value:
40807
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qmng4.dll
Value:
2024-11-25T01:58:33
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qsvg4.dll
Value:
40807
(PID) Process:(2100) labelImg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats
Operation:writeName:qtga4.dll
Value:
40807
Executable files
34
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\unicodedata.pydexecutable
MD5:B4530ADC9CBA15114A001D1AAE2E98B3
SHA256:C7C85F717B8A3676716BB2106E31B288EA1DFE90D1802180169CF92488F47DDE
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\sip.pydexecutable
MD5:C722D01F6D5A762D3A43B9E642220964
SHA256:46B027D3038A0D6191183B187EFD0B0F41005AE53D35D7E6F8CC48DC962D86B0
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\_ssl.pydexecutable
MD5:6F47CDDCC5C74CF22A1B5CF710935EBF
SHA256:D9FADB044CA15EE133F157180197F6867FE21D03FB3A4F601A6F356150F1D08D
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\win32pipe.pydexecutable
MD5:E1F9FC63175A0E6799CBB58A094A80FA
SHA256:955E1A98D2DDCAA64ACF4E47135434E6557427B52D6BAC59AAAE2DAFEA463CD3
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\_hashlib.pydexecutable
MD5:3C58062B89379F2D29A12BFFD3D01AF8
SHA256:706BEBA9F66B1422AC45F35E9094846F1E6E76CF1120FCAB0835EA6BE4236B61
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\codecs\qtwcodecs4.dllexecutable
MD5:9E9B14FA5F128FA430ED5DB8EB54BC66
SHA256:C88312ACA69A0F43CB1C81A0582C8077BDB6D95E5DEB72E5F6A147D0C4DAB11E
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\codecs\qjpcodecs4.dllexecutable
MD5:875A260560C78F5DAB835AB84A3DC2ED
SHA256:1896B90FAB05A0C9D53D3B2D954728B99903FD29D466401FC8948AB07135B413
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\select.pydexecutable
MD5:4F1C033A4B8B1BC19565A78655C0E385
SHA256:029D60725554EF87BF13C667B01AD32159DD2852FACA43F3A81D71D0062A3A33
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\bz2.pydexecutable
MD5:A9445508C595C742D93B473B1DB1758C
SHA256:E9E06E0D6E4B9B3486EB0E100C35B13C90A92864305CDE9E6DAEA74CFF7722CD
4444labelImg.exeC:\Users\admin\AppData\Local\Temp\_MEI44442\qt4_plugins\imageformats\qico4.dllexecutable
MD5:89CE1B694879E18835B794462D0A9768
SHA256:5C1E4FD2A2931486287BD09B13FA306AE7562B6980F95C0BF38126140AEBA6F2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4972
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4972
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4392
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6060
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
6060
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
2.23.209.130:443
www.bing.com
Akamai International B.V.
GB
whitelisted
1176
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.181.156
whitelisted
www.bing.com
  • 2.23.209.130
  • 2.23.209.187
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.73
  • 20.190.159.71
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.23
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 2.18.97.227
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info