File name:

cubaris.exe

Full analysis: https://app.any.run/tasks/8029c856-342b-4660-b4ab-8a5c4a09eb54
Verdict: Malicious activity
Analysis date: November 25, 2024, 15:38:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

220018663CEB55E74BE2E72F48508523

SHA1:

9C7E588A1F0D3B30D2927A4C70E6E993CF9B4EB6

SHA256:

EC714178E195F75911F9FEDB086DA20C8C2DCD50196DBBC7D2B62F8414C86162

SSDEEP:

98304:bJ3spajdILbOZt9CyLVe1SWx23evqBQTugnt+J9WCETYhaRjg20VPDAAQm7SukZa:LP/acG20k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • cubaris.exe (PID: 6628)
    • Process drops legitimate windows executable

      • cubaris.exe (PID: 6628)
    • Executable content was dropped or overwritten

      • cubaris.exe (PID: 6628)
    • Process drops python dynamic module

      • cubaris.exe (PID: 6628)
    • The process drops C-runtime libraries

      • cubaris.exe (PID: 6628)
  • INFO

    • Create files in a temporary directory

      • cubaris.exe (PID: 6628)
    • Reads the computer name

      • cubaris.exe (PID: 6628)
      • cubaris.exe (PID: 6660)
    • Checks supported languages

      • cubaris.exe (PID: 6628)
      • cubaris.exe (PID: 6660)
    • Reads the machine GUID from the registry

      • cubaris.exe (PID: 6660)
    • Checks proxy server information

      • cubaris.exe (PID: 6660)
    • PyInstaller has been detected (YARA)

      • cubaris.exe (PID: 6628)
      • cubaris.exe (PID: 6660)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:25 15:37:43+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 154624
UninitializedDataSize: -
EntryPoint: 0xce20
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cubaris.exe cubaris.exe cubaris.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6484"C:\Users\admin\AppData\Local\Temp\cubaris.exe" C:\Users\admin\AppData\Local\Temp\cubaris.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\cubaris.exe
c:\windows\system32\ntdll.dll
6628"C:\Users\admin\AppData\Local\Temp\cubaris.exe" C:\Users\admin\AppData\Local\Temp\cubaris.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\cubaris.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6660"C:\Users\admin\AppData\Local\Temp\cubaris.exe" C:\Users\admin\AppData\Local\Temp\cubaris.exe
cubaris.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\cubaris.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
29 161
Read events
29 161
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\_bz2.pydexecutable
MD5:B024A6F227EAFA8D43EDFC1A560FE651
SHA256:C0DD9496B19BA9536A78A43A97704E7D4BEF3C901D196ED385E771366682819D
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\_decimal.pydexecutable
MD5:FF0BF710EB2D7817C49E1F4E21502073
SHA256:C6EB532DA62A115AE75F58766B632E005140A2E7C9C67A77564F1804685A377F
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\Pythonwin\win32ui.pydexecutable
MD5:73925CDB0FB73121F5B020ED18007D0E
SHA256:8F76EE2BE223A57D477B10CC4109FA4D29A2B724D386AC3D71C237CF7B4B8520
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\unicodedata.pydexecutable
MD5:3BA2A20DDA6D1B4670767455BBE32870
SHA256:3A0987025F1CF2111DC6E4F59402073BA123D7436D809EE4198B4E7BFB8CB868
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\VCRUNTIME140_1.dllexecutable
MD5:135359D350F72AD4BF716B764D39E749
SHA256:34048ABAA070ECC13B318CEA31425F4CA3EDD133D350318AC65259E6058C8B32
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\VCRUNTIME140.dllexecutable
MD5:F34EB034AA4A9735218686590CBA2E8B
SHA256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\_socket.pydexecutable
MD5:CD56F508E7C305D4BFDEB820ECF3A323
SHA256:9E97B782B55400E5A914171817714BBBC713C0A396E30496C645FC82835E4B34
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\base_library.zipcompressed
MD5:B694BDA60770A7ED7EF2715DD1894CA9
SHA256:392760A1DA9C380316E25A4671563CA98A8F10B074B56948C54F6C003E16A5BB
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\_hashlib.pydexecutable
MD5:69DC506CF2FA3DA9D0CABA05FCA6A35D
SHA256:C5B8C4582E201FEF2D8CB2C8672D07B86DEC31AFB4A17B758DBFB2CFF163B12F
6628cubaris.exeC:\Users\admin\AppData\Local\Temp\_MEI66282\_ssl.pydexecutable
MD5:70014E88ECF3133B7BE097536F77B459
SHA256:D318795C98C5F3C127C8E47220A92ACBA0736DAF31BAB0DC9C7E6C3513BB2AA3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
43
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2356
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2356
svchost.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7116
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7116
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6748
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.16.204.141:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5200
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2356
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2356
svchost.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6660
cubaris.exe
140.82.121.3:443
github.com
GITHUB
US
shared
6660
cubaris.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
shared

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.16.204.141
  • 2.16.204.150
  • 2.16.204.157
  • 2.16.204.134
  • 2.16.204.158
  • 2.16.204.135
  • 2.16.204.144
  • 2.16.204.137
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.37.237.227
whitelisted
google.com
  • 142.250.186.46
whitelisted
github.com
  • 140.82.121.3
shared
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.108.133
shared
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.64
  • 40.126.31.73
  • 20.190.159.68
  • 40.126.31.67
whitelisted
go.microsoft.com
  • 23.52.181.141
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info