File name:

NED32.exe

Full analysis: https://app.any.run/tasks/bb950fbe-a2f9-4419-8599-4b8c6d7c22e6
Verdict: Malicious activity
Analysis date: April 17, 2025, 18:09:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

7D13A4A2FB50491FC1A5672F0CBAB8A3

SHA1:

A8F799E28A905E0D07C82A5F6A9402C2C9F2BC6A

SHA256:

F703AA2110EE451AD1FC6F141AA99A8C8100C1516A5B8FCBDEB174A0665360E4

SSDEEP:

98304:mf5wdvi499js968CZ8cYnfPwt+LpawxfCiyliOIRBJnic5ziC3Ag9pf7B2rgM0tz:SQlQ1cD+mJ1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • NED32.exe (PID: 7176)
    • Executable content was dropped or overwritten

      • NED32.exe (PID: 7176)
    • Process drops legitimate windows executable

      • NED32.exe (PID: 7176)
    • Application launched itself

      • NED32.exe (PID: 7176)
    • The process drops C-runtime libraries

      • NED32.exe (PID: 7176)
    • There is functionality for taking screenshot (YARA)

      • NED32.exe (PID: 7196)
  • INFO

    • The sample compiled with english language support

      • NED32.exe (PID: 7176)
    • Checks supported languages

      • NED32.exe (PID: 7176)
      • NED32.exe (PID: 7196)
    • Reads the machine GUID from the registry

      • NED32.exe (PID: 7196)
    • PyInstaller has been detected (YARA)

      • NED32.exe (PID: 7176)
      • NED32.exe (PID: 7196)
    • Checks proxy server information

      • slui.exe (PID: 7932)
    • Reads the software policy settings

      • slui.exe (PID: 7932)
    • Create files in a temporary directory

      • NED32.exe (PID: 7176)
    • Reads the computer name

      • NED32.exe (PID: 7196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:07:09 14:20:49+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 134144
InitializedDataSize: 196608
UninitializedDataSize: -
EntryPoint: 0x8d98
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ned32.exe ned32.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7176"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7196"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exeNED32.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7932C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
670
Read events
670
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_hashlib.pydexecutable
MD5:C94E5379DC430BC98B676260A929C1C6
SHA256:11E2BA61C5D94999BACE0BD8AF8CE75DC10C2C494EBB4120367F7FC98209B61D
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\NED32.exe.manifestxml
MD5:05048C3C0419B935C264CFA3D7612FD6
SHA256:BF7C46BE26D84843F8C859E6790B02743068C0AD690C6E3582A5E60356DEE51C
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_cffi_backend.pydexecutable
MD5:57A71F4B0E8F7D90D6F7E2C1D2F93B95
SHA256:FC25BCCF367CB1236E84568BF817B2906CC601C420F793B89BBBC279EBB55120
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_ctypes.pydexecutable
MD5:F5EC0B24DFC7952241C7A86ABFB61455
SHA256:6C560FB6BAC55B5B75ECD80D6F6EFE797544FB6DB060818F0A6E510AC5ABD191
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_ssl.pydexecutable
MD5:1B4639E2970BC4A12E0715F161C26E15
SHA256:260F8AB785E3B22C241D578A5442FF287B1BF13A886B077A105F0E85D1C3A774
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\cryptography.hazmat.bindings._constant_time.pydexecutable
MD5:6B546A14563972ED1D53A56B75B46918
SHA256:AB5D91858C20B3F2351AE7DF4C011DC0D0209F92E22DED3821D72A473DF56CB7
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\select.pydexecutable
MD5:5659B1B9B316B0DD48556293FD2062F2
SHA256:8AFFE8E006052571EDCC086CEF04DF16C18B8C4DE0584B80F870933F63FCD512
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\msvcp90.dllexecutable
MD5:5A04D3385603D4ED780D654E1219DB9D
SHA256:1A696D74D00EDD47F1EF90F9DCDB1BE9044D36D8DEAB7E1542E7A436D5F0ED25
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\msvcr90.dllexecutable
MD5:AB2156D75B2C9589F925FC2AB83607E6
SHA256:BC832BFBC5FA36B6E712C9D3DE99D5EBE57EC94FE2838CA2F81DB42EED49EFCC
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\pyexpat.pydexecutable
MD5:9854C014A8EF7C4FD019C3A1D2C5D1AA
SHA256:DB794F7906C6436813286B9A717854644D55180B7D9BBCA595EAAD6809E121B6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
23
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7744
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7744
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.69
  • 40.126.31.71
  • 20.190.159.2
  • 40.126.31.2
  • 20.190.159.131
  • 40.126.31.73
  • 40.126.31.130
  • 40.126.31.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info