File name:

NED32.exe

Full analysis: https://app.any.run/tasks/78a5863f-5504-4260-af37-7ad923c435f8
Verdict: Malicious activity
Analysis date: April 03, 2025, 15:51:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

7D13A4A2FB50491FC1A5672F0CBAB8A3

SHA1:

A8F799E28A905E0D07C82A5F6A9402C2C9F2BC6A

SHA256:

F703AA2110EE451AD1FC6F141AA99A8C8100C1516A5B8FCBDEB174A0665360E4

SSDEEP:

98304:mf5wdvi499js968CZ8cYnfPwt+LpawxfCiyliOIRBJnic5ziC3Ag9pf7B2rgM0tz:SQlQ1cD+mJ1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • NED32.exe (PID: 7364)
    • The process drops C-runtime libraries

      • NED32.exe (PID: 7364)
    • Process drops legitimate windows executable

      • NED32.exe (PID: 7364)
    • Executable content was dropped or overwritten

      • NED32.exe (PID: 7364)
    • Application launched itself

      • NED32.exe (PID: 7364)
    • There is functionality for taking screenshot (YARA)

      • NED32.exe (PID: 7384)
  • INFO

    • The sample compiled with english language support

      • NED32.exe (PID: 7364)
    • Checks supported languages

      • NED32.exe (PID: 7364)
      • NED32.exe (PID: 7384)
    • Create files in a temporary directory

      • NED32.exe (PID: 7364)
    • Reads the computer name

      • NED32.exe (PID: 7384)
    • Reads the machine GUID from the registry

      • NED32.exe (PID: 7384)
    • PyInstaller has been detected (YARA)

      • NED32.exe (PID: 7364)
      • NED32.exe (PID: 7384)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:07:09 14:20:49+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 134144
InitializedDataSize: 196608
UninitializedDataSize: -
EntryPoint: 0x8d98
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ned32.exe ned32.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7364"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7384"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exeNED32.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7436C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7468"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
352
Read events
352
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\cryptography.hazmat.bindings._constant_time.pydexecutable
MD5:6B546A14563972ED1D53A56B75B46918
SHA256:AB5D91858C20B3F2351AE7DF4C011DC0D0209F92E22DED3821D72A473DF56CB7
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_ssl.pydexecutable
MD5:1B4639E2970BC4A12E0715F161C26E15
SHA256:260F8AB785E3B22C241D578A5442FF287B1BF13A886B077A105F0E85D1C3A774
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\Microsoft.VC90.CRT.manifestxml
MD5:26A7382CB244C06D5CFBF839FA6C31FA
SHA256:4C63B22D7277DD51E1407245D994A864D1EEA5B7DBB0EE08111C7CF7FE9204FF
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\NED32.exe.manifestxml
MD5:05048C3C0419B935C264CFA3D7612FD6
SHA256:BF7C46BE26D84843F8C859E6790B02743068C0AD690C6E3582A5E60356DEE51C
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\cryptography.hazmat.bindings._padding.pydexecutable
MD5:BD750737B5E46412234E9B1328210F14
SHA256:BAAC59440251EA21203116E696613C20FCD41A10A0512C56D91C08173FA8B1EB
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_cffi_backend.pydexecutable
MD5:57A71F4B0E8F7D90D6F7E2C1D2F93B95
SHA256:FC25BCCF367CB1236E84568BF817B2906CC601C420F793B89BBBC279EBB55120
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\cryptography.hazmat.bindings._openssl.pydexecutable
MD5:D974266F3ED9EC1A03F137DC189C5FD5
SHA256:7EE0D8E8EB5FE5AF42450ED0CEA50930103F6BF010FE7E84EDDE696E81C73F24
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\msvcp90.dllexecutable
MD5:5A04D3385603D4ED780D654E1219DB9D
SHA256:1A696D74D00EDD47F1EF90F9DCDB1BE9044D36D8DEAB7E1542E7A436D5F0ED25
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\msvcm90.dllexecutable
MD5:EDE65ADA7411ABA6D538D599AD130E5F
SHA256:5AC8F77BCB2B4FE9AF85E9D8E89B373A231E46C40167E7BFC959CAF0BA86874E
7364NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_hashlib.pydexecutable
MD5:C94E5379DC430BC98B676260A929C1C6
SHA256:11E2BA61C5D94999BACE0BD8AF8CE75DC10C2C494EBB4120367F7FC98209B61D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.22:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.22:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.22:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8036
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8036
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.22:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.22:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
40.126.31.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.172.255.216:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
8036
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.22
  • 23.216.77.20
  • 23.216.77.30
  • 23.216.77.36
  • 23.216.77.42
  • 23.216.77.8
whitelisted
login.live.com
  • 40.126.31.128
  • 20.190.159.23
  • 40.126.31.67
  • 40.126.31.3
  • 20.190.159.71
  • 20.190.159.68
  • 40.126.31.1
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.172.255.216
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info