File name:

todo_app.exe

Full analysis: https://app.any.run/tasks/a8c1f28f-8f06-4269-b82e-cc4d09a3d716
Verdict: Malicious activity
Analysis date: March 24, 2025, 12:45:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

9BEAD0499F5A86EF3FD155E19D0A8FA3

SHA1:

BC14B5298A09EA97AA56A4EF165C97ACF96554A2

SHA256:

F133028C1C2954D40F0A8FA45E0766397C7BCDF7758FE532288E0F017BCAF994

SSDEEP:

196608:G35oG8gKDl2TaMzpdTyYoklNUfkGrCKvgLl9t0:q55HKEZpdTylGNUfkGOK4Rn0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • todo_app.exe (PID: 7776)
      • todo_app.exe (PID: 7752)
    • The process drops C-runtime libraries

      • todo_app.exe (PID: 7776)
      • todo_app.exe (PID: 7752)
    • Process drops python dynamic module

      • todo_app.exe (PID: 7776)
      • todo_app.exe (PID: 7752)
    • Executable content was dropped or overwritten

      • todo_app.exe (PID: 7776)
      • todo_app.exe (PID: 7752)
    • Application launched itself

      • todo_app.exe (PID: 7776)
    • Loads Python modules

      • todo_app.exe (PID: 1348)
  • INFO

    • The sample compiled with english language support

      • todo_app.exe (PID: 7776)
      • todo_app.exe (PID: 7752)
    • Checks supported languages

      • todo_app.exe (PID: 7776)
    • Reads the computer name

      • todo_app.exe (PID: 7776)
    • Create files in a temporary directory

      • todo_app.exe (PID: 7776)
      • todo_app.exe (PID: 7752)
    • Manual execution by a user

      • todo_app.exe (PID: 7752)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:22 16:31:16+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce20
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
3
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start todo_app.exe todo_app.exe todo_app.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1348"C:\Users\admin\Desktop\todo_app.exe" C:\Users\admin\Desktop\todo_app.exetodo_app.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\todo_app.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7752"C:\Users\admin\Desktop\todo_app.exe" C:\Users\admin\Desktop\todo_app.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\todo_app.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7776"C:\Users\admin\Desktop\todo_app.exe" C:\Users\admin\Desktop\todo_app.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\todo_app.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
179
Read events
179
Write events
0
Delete events
0

Modification events

No data
Executable files
43
Suspicious files
6
Text files
1 774
Unknown types
0

Dropped files

PID
Process
Filename
Type
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\PIL\_webp.cp313-win_amd64.pydexecutable
MD5:F12EB0F075399240E8C42A1584EE16AB
SHA256:EB77C7461AB4120FC0A6FADE67B78A0F96ECE2BD40A1FD314563B9A9F27F50F2
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\PIL\_imagingmath.cp313-win_amd64.pydexecutable
MD5:4CDB59704F5E26DE6F8A1D5B363BAE27
SHA256:823E8BE2F52CF54FBAA23BD3351EAE476F54749798C6BED0773B5647F408041E
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\PIL\_imagingcms.cp313-win_amd64.pydexecutable
MD5:03429236FF44C1798CC31A17CB78070C
SHA256:7A924F28FD05A5786418AA78F68F22FFB4990B9320E26A8221D52341A6CC6EA6
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\_queue.pydexecutable
MD5:59C05030E47BDE800AD937CCB98802D8
SHA256:E4956834DF819C1758D17C1C42A152306F7C0EA7B457CA24CE2F6466A6CB1CAA
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\_hashlib.pydexecutable
MD5:CF4120BAD9A7F77993DD7A95568D83D7
SHA256:14765E83996FE6D50AEDC11BB41D7C427A3E846A6A6293A4A46F7EA7E3F14148
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\_decimal.pydexecutable
MD5:F465C15E7BACEAC920DC58A5FB922C1C
SHA256:F4A486A0CA6A53659159A404614C7E7EDCCB6BFBCDEB844F6CEE544436A826CB
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\_ctypes.pydexecutable
MD5:2185849BC0423F6641EE30804F475478
SHA256:199CD8D7DB743C316771EF7BBF414BA9A9CDAE1F974E90DA6103563B2023538D
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\PIL\_imaging.cp313-win_amd64.pydexecutable
MD5:A9BB6A0FF7A73BE913412C8A29B76B5F
SHA256:DA0917FB34AE6902818960B9E50F66FA779ED8A4B0D80C7D9D96321AD99122E0
7776todo_app.exeC:\Users\admin\AppData\Local\Temp\_MEI77762\PIL\_imagingtk.cp313-win_amd64.pydexecutable
MD5:ABFD4E7F05394BEBCE6274D0D3C8981A
SHA256:30BE768EB100C0112DA3C0E2CF6CD48081327A52AD38E7A2FFA741592EF57E00
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7312
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7312
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7312
backgroundTaskHost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.51
  • 2.16.164.120
  • 2.16.164.18
  • 2.16.164.72
whitelisted
login.live.com
  • 40.126.31.129
  • 20.190.159.4
  • 20.190.159.130
  • 40.126.31.2
  • 20.190.159.23
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.0
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info