File name:

skype.exe

Full analysis: https://app.any.run/tasks/742b1ad9-838c-4938-96cf-408360b1ca59
Verdict: Malicious activity
Analysis date: October 07, 2024, 17:17:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

D11743B11A65AB7CA9A61913151BAC40

SHA1:

42E182D0CD1D3BB2F055BE55ABE880C675BA9DAD

SHA256:

DB27FD09303A4B73F0635E779269C53938425B7F631345B5F2A96739F2185DF7

SSDEEP:

98304:UNxBUQD+XIYLPZNvQ/Hw0704B6LQ4mJWje3yuTf4ufYRD0fpVufyEHVP05P0x19U:8eWxjPCtlKcKqOLFdZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • skype.exe (PID: 3212)
    • Process drops legitimate windows executable

      • skype.exe (PID: 3212)
    • Application launched itself

      • skype.exe (PID: 3212)
    • Process drops python dynamic module

      • skype.exe (PID: 3212)
    • Executable content was dropped or overwritten

      • skype.exe (PID: 3212)
    • Loads Python modules

      • skype.exe (PID: 3556)
    • Reads the Internet Settings

      • skype.exe (PID: 3556)
  • INFO

    • Reads the computer name

      • skype.exe (PID: 3212)
      • skype.exe (PID: 3556)
      • wmpnscfg.exe (PID: 3848)
    • Checks supported languages

      • skype.exe (PID: 3212)
      • skype.exe (PID: 3556)
      • wmpnscfg.exe (PID: 3848)
    • Create files in a temporary directory

      • skype.exe (PID: 3212)
    • Reads the machine GUID from the registry

      • skype.exe (PID: 3556)
    • Checks proxy server information

      • skype.exe (PID: 3556)
    • PyInstaller has been detected (YARA)

      • skype.exe (PID: 3212)
      • skype.exe (PID: 3556)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:08:08 12:29:54+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 128000
InitializedDataSize: 116736
UninitializedDataSize: -
EntryPoint: 0x781a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT skype.exe THREAT skype.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3212"C:\Users\admin\AppData\Local\Temp\skype.exe" C:\Users\admin\AppData\Local\Temp\skype.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\skype.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
3556"C:\Users\admin\AppData\Local\Temp\skype.exe" C:\Users\admin\AppData\Local\Temp\skype.exe
skype.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\skype.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
3848"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
209
Read events
209
Write events
0
Delete events
0

Modification events

No data
Executable files
53
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CB978304B79EF53962408C611DFB20F5
SHA256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_lzma.pydexecutable
MD5:B7F979DBAC49A9908B1EF32602D345E0
SHA256:141B4BDEFAE997AF2F8C31602B2864DD30D655B1C20385DD31A098BA596ACFE0
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_bz2.pydexecutable
MD5:754B62BE2DBAB2C25DC3DD65AAC9EBB2
SHA256:15A8B8543A3A485321C310FC51531F2BAD14C8CB51B98C7B039A68FB34DE8DDA
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_hashlib.pydexecutable
MD5:CC867B685F9D4AB258437D86663E2839
SHA256:4504720C2DFD09770D53BA71C8BA64D128B51284F3942A5964390416DE481D2F
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_queue.pydexecutable
MD5:CB9F4B92F130B564767359A8DAC8D05B
SHA256:297A96DC95709034C4B802E25F769105F9EB4866B70991208C4BD8315171CAF6
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_ssl.pydexecutable
MD5:2E2B2B0C18E5D897CA79A3BD70685233
SHA256:98558E6F4FA2706F011B324721CEB884795549C1A863C8B46AF08F2B15CFDA5E
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:6D778E83F74A4C7FE4C077DC279F6867
SHA256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:502263C56F931DF8440D7FD2FA7B7C00
SHA256:94A5DF1227818EDBFD0D5091C6A48F86B4117C38550343F780C604EEE1CD6231
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:E2F648AE40D234A3892E1455B4DBBE05
SHA256:C8C499B012D0D63B7AFC8B4CA42D6D996B2FCF2E8B5F94CACFBEC9E6F33E8A03
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
8
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3556
skype.exe
192.168.40.3:80
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.174
whitelisted

Threats

No threats detected
No debug info