File name:

skype.exe

Full analysis: https://app.any.run/tasks/742b1ad9-838c-4938-96cf-408360b1ca59
Verdict: Malicious activity
Analysis date: October 07, 2024, 17:17:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

D11743B11A65AB7CA9A61913151BAC40

SHA1:

42E182D0CD1D3BB2F055BE55ABE880C675BA9DAD

SHA256:

DB27FD09303A4B73F0635E779269C53938425B7F631345B5F2A96739F2185DF7

SSDEEP:

98304:UNxBUQD+XIYLPZNvQ/Hw0704B6LQ4mJWje3yuTf4ufYRD0fpVufyEHVP05P0x19U:8eWxjPCtlKcKqOLFdZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • skype.exe (PID: 3212)
    • Process drops legitimate windows executable

      • skype.exe (PID: 3212)
    • Application launched itself

      • skype.exe (PID: 3212)
    • The process drops C-runtime libraries

      • skype.exe (PID: 3212)
    • Loads Python modules

      • skype.exe (PID: 3556)
    • Executable content was dropped or overwritten

      • skype.exe (PID: 3212)
    • Reads the Internet Settings

      • skype.exe (PID: 3556)
  • INFO

    • Create files in a temporary directory

      • skype.exe (PID: 3212)
    • Checks supported languages

      • skype.exe (PID: 3556)
      • skype.exe (PID: 3212)
      • wmpnscfg.exe (PID: 3848)
    • Reads the computer name

      • skype.exe (PID: 3212)
      • skype.exe (PID: 3556)
      • wmpnscfg.exe (PID: 3848)
    • Checks proxy server information

      • skype.exe (PID: 3556)
    • Reads the machine GUID from the registry

      • skype.exe (PID: 3556)
    • PyInstaller has been detected (YARA)

      • skype.exe (PID: 3212)
      • skype.exe (PID: 3556)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:08:08 12:29:54+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 128000
InitializedDataSize: 116736
UninitializedDataSize: -
EntryPoint: 0x781a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT skype.exe THREAT skype.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3212"C:\Users\admin\AppData\Local\Temp\skype.exe" C:\Users\admin\AppData\Local\Temp\skype.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\skype.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
3556"C:\Users\admin\AppData\Local\Temp\skype.exe" C:\Users\admin\AppData\Local\Temp\skype.exe
skype.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\skype.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
3848"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
209
Read events
209
Write events
0
Delete events
0

Modification events

No data
Executable files
53
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_queue.pydexecutable
MD5:CB9F4B92F130B564767359A8DAC8D05B
SHA256:297A96DC95709034C4B802E25F769105F9EB4866B70991208C4BD8315171CAF6
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_bz2.pydexecutable
MD5:754B62BE2DBAB2C25DC3DD65AAC9EBB2
SHA256:15A8B8543A3A485321C310FC51531F2BAD14C8CB51B98C7B039A68FB34DE8DDA
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_ctypes.pydexecutable
MD5:3D63BFE259A091DEE1FF2B5A375FAE6B
SHA256:E740232C68E08DB0CFD3FE615817117CAA80BDEF5276C536D3CD22E9C18987C1
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_socket.pydexecutable
MD5:2C77EBD0C69DE8DC3FEEC3FF8A26A6BF
SHA256:A05BA444C837FB4D43174B6552FCAEFA2952AD31C620A3EAD9B001CE4BF7928A
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_ssl.pydexecutable
MD5:2E2B2B0C18E5D897CA79A3BD70685233
SHA256:98558E6F4FA2706F011B324721CEB884795549C1A863C8B46AF08F2B15CFDA5E
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_hashlib.pydexecutable
MD5:CC867B685F9D4AB258437D86663E2839
SHA256:4504720C2DFD09770D53BA71C8BA64D128B51284F3942A5964390416DE481D2F
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\_lzma.pydexecutable
MD5:B7F979DBAC49A9908B1EF32602D345E0
SHA256:141B4BDEFAE997AF2F8C31602B2864DD30D655B1C20385DD31A098BA596ACFE0
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:6DB54065B33861967B491DD1C8FD8595
SHA256:945CC64EE04B1964C1F9FCDC3124DD83973D332F5CFB696CDF128CA5C4CBD0E5
3212skype.exeC:\Users\admin\AppData\Local\Temp\_MEI32122\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:2EA3901D7B50BF6071EC8732371B821C
SHA256:44F6DF4280C8ECC9C6E609B1A4BFEE041332D337D84679CFE0D6678CE8F2998A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
8
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3556
skype.exe
192.168.40.3:80
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.174
whitelisted

Threats

No threats detected
No debug info