File name:

garaveli07ANTALYA.exe

Full analysis: https://app.any.run/tasks/388c94f5-a72f-4f85-a5c6-8da8c587981b
Verdict: Malicious activity
Analysis date: November 07, 2024, 11:58:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

9533FDC44E32F4651D34B29524604446

SHA1:

D6C2F0203F37CD63FD9BE1A666925CC0B2CE17A7

SHA256:

C630CF80906AE68D90BD5076580CBF516DF2B11CAFAD4954AD10D7F3FA094682

SSDEEP:

98304:FIyDP5QOByhZwlB4N+wcTAScUCYUlSA2ibMlq0ThIbjQrfmpfaQD7UJDZ2pli9TI:VcTyYIwnGoLkIW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • garaveli07ANTALYA.exe (PID: 4088)
    • Application launched itself

      • garaveli07ANTALYA.exe (PID: 4088)
    • Process drops legitimate windows executable

      • garaveli07ANTALYA.exe (PID: 4088)
    • Executable content was dropped or overwritten

      • garaveli07ANTALYA.exe (PID: 4088)
    • The process drops C-runtime libraries

      • garaveli07ANTALYA.exe (PID: 4088)
    • Loads Python modules

      • garaveli07ANTALYA.exe (PID: 6100)
    • Potential Corporate Privacy Violation

      • garaveli07ANTALYA.exe (PID: 6100)
  • INFO

    • Checks supported languages

      • garaveli07ANTALYA.exe (PID: 4088)
      • garaveli07ANTALYA.exe (PID: 6100)
    • Reads the computer name

      • garaveli07ANTALYA.exe (PID: 4088)
      • garaveli07ANTALYA.exe (PID: 6100)
    • Checks proxy server information

      • garaveli07ANTALYA.exe (PID: 6100)
    • Create files in a temporary directory

      • garaveli07ANTALYA.exe (PID: 4088)
    • PyInstaller has been detected (YARA)

      • garaveli07ANTALYA.exe (PID: 4088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:06 18:16:20+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 176640
InitializedDataSize: 182272
UninitializedDataSize: -
EntryPoint: 0xc320
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT garaveli07antalya.exe conhost.exe no specs garaveli07antalya.exe

Process information

PID
CMD
Path
Indicators
Parent process
4088"C:\Users\admin\AppData\Local\Temp\garaveli07ANTALYA.exe" C:\Users\admin\AppData\Local\Temp\garaveli07ANTALYA.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\garaveli07antalya.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4236\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exegaraveli07ANTALYA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6100"C:\Users\admin\AppData\Local\Temp\garaveli07ANTALYA.exe" C:\Users\admin\AppData\Local\Temp\garaveli07ANTALYA.exe
garaveli07ANTALYA.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\garaveli07antalya.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
561
Read events
561
Write events
0
Delete events
0

Modification events

No data
Executable files
15
Suspicious files
1
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\certifi\cacert.pemtext
MD5:50EA156B773E8803F6C1FE712F746CBA
SHA256:94EDEB66E91774FCAE93A05650914E29096259A5C7E871A1F65D461AB5201B47
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\_ctypes.pydexecutable
MD5:A55E57D7594303C89B5F7A1D1D6F2B67
SHA256:F63C6C7E71C342084D8F1A108786CA6975A52CEFEF8BE32CC2589E6E2FE060C8
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\unicodedata.pydexecutable
MD5:0902D299A2A487A7B0C2D75862B13640
SHA256:2693C7EE4FBA55DC548F641C0CB94485D0E18596FFEF16541BD43A5104C28B20
6100garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\GARAVELI\benutzerkennwörter.txttext
MD5:48447FCF3EBBBB64F4D2084887EC0E84
SHA256:79EB48ADA5AB36A7DB12D5C1DF13E0E79EC1DDA5B80F2FD93F367818A9E30DAB
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\_hashlib.pydexecutable
MD5:32D76C9ABD65A5D2671AEEDE189BC290
SHA256:838D5C8B7C3212C8429BAF612623ABBBC20A9023EEC41E34E5461B76A285B86C
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\_queue.pydexecutable
MD5:1C03CAA59B5E4A7FB9B998D8C1DA165A
SHA256:B9CF502DADCB124F693BF69ECD7077971E37174104DBDA563022D74961A67E1E
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\select.pydexecutable
MD5:20831703486869B470006941B4D996F2
SHA256:78E5994C29D8851F28B5B12D59D742D876683AEA58ECEEA1FB895B2036CDCDEB
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\python313.dllexecutable
MD5:B9DE917B925DD246B709BB4233777EFD
SHA256:0C0A66505093B6A4BB3475F716BD3D9552095776F6A124709C13B3F9552C7D99
4088garaveli07ANTALYA.exeC:\Users\admin\AppData\Local\Temp\_MEI40882\libffi-8.dllexecutable
MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
SHA256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
80
DNS requests
21
Threats
41

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.216.77.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6100
garaveli07ANTALYA.exe
POST
200
212.227.140.86:80
http://netiptv.eu/token
unknown
unknown
6100
garaveli07ANTALYA.exe
POST
200
212.227.140.86:80
http://netiptv.eu/token
unknown
unknown
6100
garaveli07ANTALYA.exe
GET
200
212.227.140.86:80
http://netiptv.eu/getMacData/bs:24:09:dw:am:gn:06:34
unknown
unknown
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6100
garaveli07ANTALYA.exe
POST
200
212.227.140.86:80
http://netiptv.eu/token
unknown
unknown
6100
garaveli07ANTALYA.exe
POST
200
212.227.140.86:80
http://netiptv.eu/token
unknown
unknown
6100
garaveli07ANTALYA.exe
POST
200
212.227.140.86:80
http://netiptv.eu/token
unknown
unknown
6100
garaveli07ANTALYA.exe
POST
200
212.227.140.86:80
http://netiptv.eu/token
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4360
SearchApp.exe
2.16.110.195:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
23.216.77.24:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6944
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
6100
garaveli07ANTALYA.exe
212.227.140.86:80
netiptv.eu
IONOS SE
DE
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.16.110.195
  • 2.16.110.120
  • 2.16.110.144
  • 2.16.110.130
  • 2.16.110.131
  • 2.16.110.194
  • 2.16.110.121
  • 2.16.110.123
  • 2.16.110.138
  • 2.16.110.193
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.216.77.24
  • 23.216.77.23
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
google.com
  • 172.217.16.142
whitelisted
netiptv.eu
  • 212.227.140.86
unknown
login.live.com
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.22
  • 40.126.32.72
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.138
whitelisted
th.bing.com
  • 2.16.110.194
  • 2.16.110.187
  • 2.16.110.177
  • 2.16.110.195
  • 2.16.110.120
  • 2.16.110.192
  • 2.16.110.193
  • 2.16.110.186
  • 2.16.110.121
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted

Threats

Found threats are available for the paid subscriptions
41 ETPRO signatures available at the full report
No debug info