File name:

CV-Indiana-Johnes.pdf.exe

Full analysis: https://app.any.run/tasks/d9a343d6-4c96-4256-94e4-8dc09cf8c9da
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:03:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 3 sections
MD5:

94700D099F55903EDFB286F223D4FE6E

SHA1:

2296679E7FC36C9A44C63E9154DB447B5CD04474

SHA256:

D8E3516C4D65A8D0B35F87D60E1B01F3730E3456658F5A38FDA525E8EACFC009

SSDEEP:

98304:ZzGouKRBzXqVyqX5ysBfUyRpTe2SnPyTPjW4Uc346MYjH/2xumzy7266tHfktEzd:z8JrbLhXFEEwDoD5T8A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
    • Application launched itself

      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
    • The process drops C-runtime libraries

      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
    • Executable content was dropped or overwritten

      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
    • Loads Python modules

      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
    • Process drops python dynamic module

      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
    • The executable file from the user directory is run by the CMD process

      • OpenVpnConnect.exe (PID: 6720)
    • Starts CMD.EXE for commands execution

      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
      • OpenVpnConnect.exe (PID: 6720)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 6756)
    • Executing commands from a ".bat" file

      • OpenVpnConnect.exe (PID: 6720)
  • INFO

    • Checks supported languages

      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
      • OpenVpnConnect.exe (PID: 6720)
    • Create files in a temporary directory

      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
      • OpenVpnConnect.exe (PID: 6720)
    • Checks proxy server information

      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
    • Reads the computer name

      • CV-Indiana-Johnes.pdf.exe (PID: 6684)
      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
      • OpenVpnConnect.exe (PID: 6720)
    • The sample compiled with english language support

      • CV-Indiana-Johnes.pdf.exe (PID: 6600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (47)
.exe | UPX compressed Win32 Executable (46.1)
.exe | Generic Win/DOS Executable (3.4)
.exe | DOS Executable Generic (3.4)

EXIF

EXE

Subsystem: Windows command line
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x5ad70
UninitializedDataSize: 237568
InitializedDataSize: 65536
CodeSize: 135168
LinkerVersion: 14.41
PEType: PE32+
ImageFileCharacteristics: Executable, Large address aware
TimeStamp: 2024:12:12 16:25:23+00:00
MachineType: AMD AMD64
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
8
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start cv-indiana-johnes.pdf.exe conhost.exe no specs cv-indiana-johnes.pdf.exe cmd.exe no specs openvpnconnect.exe no specs cmd.exe no specs timeout.exe no specs cipher.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6600"C:\Users\admin\AppData\Local\Temp\CV-Indiana-Johnes.pdf.exe" C:\Users\admin\AppData\Local\Temp\CV-Indiana-Johnes.pdf.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\cv-indiana-johnes.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6608\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCV-Indiana-Johnes.pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6684"C:\Users\admin\AppData\Local\Temp\CV-Indiana-Johnes.pdf.exe" C:\Users\admin\AppData\Local\Temp\CV-Indiana-Johnes.pdf.exe
CV-Indiana-Johnes.pdf.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\cv-indiana-johnes.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6704C:\WINDOWS\system32\cmd.exe /c "OpenVpnConnect.exe"C:\Windows\System32\cmd.exeCV-Indiana-Johnes.pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
6720OpenVpnConnect.exeC:\Users\admin\AppData\Local\Temp\OpenVpnConnect.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
sνchost
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\openvpnconnect.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6756"cmd.exe" /c C:\Users\admin\AppData\Local\Temp\gugugaga.bat C:\Users\admin\AppData\Local\Temp\OpenVpnConnect.exeC:\Windows\System32\cmd.exeOpenVpnConnect.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
6784timeout /t 5 C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6816cipher /w:"C:\Users" C:\Windows\System32\cipher.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
File Encryption Utility
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cipher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
406
Read events
406
Write events
0
Delete events
0

Modification events

No data
Executable files
64
Suspicious files
1
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\_queue.pydexecutable
MD5:7F52EF40B083F34FD5E723E97B13382F
SHA256:3F8E7E6AA13B417ACC78B63434FB1144E6319A010A9FC376C54D6E69B638FE4C
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\VCRUNTIME140_1.dllexecutable
MD5:F8DFA78045620CF8A732E67D1B1EB53D
SHA256:A113F192195F245F17389E6ECBED8005990BCB2476DDAD33F7C4C6C86327AFE5
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\_socket.pydexecutable
MD5:B77017BAA2004833EF3847A3A3141280
SHA256:A19E3C7C03EF1B5625790B1C9C42594909311AB6DF540FBF43C6AA93300AB166
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\_bz2.pydexecutable
MD5:AA1083BDE6D21CABFC630A18F51B1926
SHA256:00B8CA9A338D2B47285C9E56D6D893DB2A999B47216756F18439997FB80A56E3
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:BFFFA7117FD9B1622C66D949BAC3F1D7
SHA256:1EA267A2E6284F17DD548C6F2285E19F7EDB15D6E737A55391140CE5CB95225E
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:33BBECE432F8DA57F17BF2E396EBAA58
SHA256:7CF0944901F7F7E0D0B9AD62753FC2FE380461B1CCE8CDC7E9C9867C980E3B0E
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:E8B9D74BFD1F6D1CC1D99B24F44DA796
SHA256:B1B3FD40AB437A43C8DB4994CCFFC7F88000CC8BB6E34A2BCBFF8E2464930C59
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\_brotli.cp311-win_amd64.pydexecutable
MD5:0606E7D1AF5D7420EA2F363A9B22E647
SHA256:79E60CD8BFD29AD1F7D0BF7A1EEC3D9ABADFCE90587438EA172034074BC174EE
6600CV-Indiana-Johnes.pdf.exeC:\Users\admin\AppData\Local\Temp\_MEI66002\MSVCP140.dllexecutable
MD5:6C3AD90EE8D03A4CE68DBB34B0D72B1E
SHA256:7B8A6F283884E6448559DCF510B00C1A885BFB8E598EA05CD2C290C874657326
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
30
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6884
SIHClient.exe
GET
200
2.23.9.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.9.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6884
SIHClient.exe
GET
200
2.23.9.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
5780
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
244
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
23.212.110.161:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.9.218:80
www.microsoft.com
AKAMAI-AS
CZ
whitelisted
4
System
192.168.100.255:138
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
www.bing.com
  • 23.212.110.161
  • 23.212.110.154
  • 23.212.110.177
  • 23.212.110.168
  • 23.212.110.171
  • 23.212.110.160
  • 23.212.110.163
  • 23.212.110.185
  • 23.212.110.162
whitelisted
crl.microsoft.com
  • 184.24.77.35
  • 184.24.77.37
whitelisted
www.microsoft.com
  • 2.23.9.218
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.136
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.140
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.109.133
shared
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info