File name:

10%.exe

Full analysis: https://app.any.run/tasks/10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c
Verdict: Malicious activity
Analysis date: March 22, 2025, 13:44:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

C76AEE58817B1A80E2D6C84D8519E0C9

SHA1:

3EAD7A39215F1A47BE6BBDBB1DAB37A56BA0BBBF

SHA256:

E6576A7D85D97CBB8090059F1098291C4A300130F4FE809555AF0BDDFEFD7AA1

SSDEEP:

98304:j1T2Q60oo5+EajRROBd9HPIkdYFuuOMwU8Jdk2n/vqisegFqy+vjRjiC5S3kE6H9:i8pPRBaHfjmxUPbyhGK0Y3aIg65

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 1764)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 7396)
    • There is functionality for taking screenshot (YARA)

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • Loads Python modules

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 1764)
    • Executable content was dropped or overwritten

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • Process drops legitimate windows executable

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • Process drops python dynamic module

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • The process drops C-runtime libraries

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • Application launched itself

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
  • INFO

    • Reads the computer name

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 1764)
      • ShellExperienceHost.exe (PID: 7396)
      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • Checks supported languages

      • ShellExperienceHost.exe (PID: 7396)
      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 1764)
      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • PyInstaller has been detected (YARA)

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • Create files in a temporary directory

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 1764)
      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
    • The sample compiled with english language support

      • 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe (PID: 7444)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:22 13:39:55+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce20
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe sppextcomobj.exe no specs slui.exe rundll32.exe no specs 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe shellexperiencehost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1764"C:\Users\admin\AppData\Local\Temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe" C:\Users\admin\AppData\Local\Temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe
10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7396"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
7444"C:\Users\admin\AppData\Local\Temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe" C:\Users\admin\AppData\Local\Temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7488C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7520"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7712C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
1 618
Read events
1 617
Write events
1
Delete events
0

Modification events

(PID) Process:(1764) 10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:JokeApp
Value:
C:\Users\admin\AppData\Local\Temp\10a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exe
Executable files
27
Suspicious files
5
Text files
921
Unknown types
0

Dropped files

PID
Process
Filename
Type
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\PIL\_imagingtk.cp312-win_amd64.pydexecutable
MD5:DD231AFD7EF2247CC89B27B8EE5A8F32
SHA256:3FA78A526C9D24620FD84673BB724C86FB68F8BF290B1AC7D8FD94C895081538
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\PIL\_imagingmath.cp312-win_amd64.pydexecutable
MD5:7F5BA18AF48B19B89F4FF89C509F1745
SHA256:045E0EF62086176AB38DDF8E52A840A39FFD50121A2694C09D35853CCB73C4FB
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\PIL\_webp.cp312-win_amd64.pydexecutable
MD5:A21A05FB1CB9830977DF1ED788B805D6
SHA256:6C7AF1E7C6D500F39BBF29E5DB9F897F3BCBB830117E6B6AD177FE1965413152
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\_tcl_data\clock.tcltext
MD5:88BB44A1364147FDD80F9FD78FBCEF61
SHA256:1947F8B188AB4AB6AA72EA68A58D2D9ADD0894FDF320F6B074EAE0F198368FB7
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\_hashlib.pydexecutable
MD5:8BAEB2BD6E52BA38F445EF71EF43A6B8
SHA256:6C50C9801A5CAF0BB52B384F9A0D5A4AA182CA835F293A39E8999CF6EDF2F087
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\_decimal.pydexecutable
MD5:F78F9855D2A7CA940B6BE51D68B80BF2
SHA256:D4AE192BBD4627FC9487A2C1CD9869D1B461C20CFD338194E87F5CF882BBED12
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\_lzma.pydexecutable
MD5:CF8DE1137F36141AFD9FF7C52A3264EE
SHA256:22D10E2D6AD3E3ED3C49EB79AB69A81AAA9D16AECA7F948DA2FE80877F106C16
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\_ssl.pydexecutable
MD5:6774D6FB8B9E7025254148DC32C49F47
SHA256:2B6F1B1AC47CB7878B62E8D6BB587052F86CA8145B05A261E855305B9CA3D36C
744410a4f1f2-90c9-469a-9f5a-40d4a0f37e1c.exeC:\Users\admin\AppData\Local\Temp\_MEI74442\_socket.pydexecutable
MD5:439B3AD279BEFA65BB40ECEBDDD6228B
SHA256:24017D664AF20EE3B89514539345CAAC83ECA34825FCF066A23E8A4C99F73E6D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6028
backgroundTaskHost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
8108
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8108
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6028
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6028
backgroundTaskHost.exe
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
google.com
  • 142.250.185.142
whitelisted
login.live.com
  • 20.190.159.23
  • 40.126.31.129
  • 20.190.159.73
  • 40.126.31.67
  • 40.126.31.128
  • 20.190.159.128
  • 20.190.159.71
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info