File name:

NED32.exe

Full analysis: https://app.any.run/tasks/bb950fbe-a2f9-4419-8599-4b8c6d7c22e6
Verdict: Malicious activity
Analysis date: April 17, 2025, 18:09:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

7D13A4A2FB50491FC1A5672F0CBAB8A3

SHA1:

A8F799E28A905E0D07C82A5F6A9402C2C9F2BC6A

SHA256:

F703AA2110EE451AD1FC6F141AA99A8C8100C1516A5B8FCBDEB174A0665360E4

SSDEEP:

98304:mf5wdvi499js968CZ8cYnfPwt+LpawxfCiyliOIRBJnic5ziC3Ag9pf7B2rgM0tz:SQlQ1cD+mJ1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops python dynamic module

      • NED32.exe (PID: 7176)
    • Process drops legitimate windows executable

      • NED32.exe (PID: 7176)
    • The process drops C-runtime libraries

      • NED32.exe (PID: 7176)
    • Executable content was dropped or overwritten

      • NED32.exe (PID: 7176)
    • Application launched itself

      • NED32.exe (PID: 7176)
    • There is functionality for taking screenshot (YARA)

      • NED32.exe (PID: 7196)
  • INFO

    • Create files in a temporary directory

      • NED32.exe (PID: 7176)
    • Checks supported languages

      • NED32.exe (PID: 7176)
      • NED32.exe (PID: 7196)
    • The sample compiled with english language support

      • NED32.exe (PID: 7176)
    • Reads the computer name

      • NED32.exe (PID: 7196)
    • Reads the machine GUID from the registry

      • NED32.exe (PID: 7196)
    • PyInstaller has been detected (YARA)

      • NED32.exe (PID: 7176)
      • NED32.exe (PID: 7196)
    • Checks proxy server information

      • slui.exe (PID: 7932)
    • Reads the software policy settings

      • slui.exe (PID: 7932)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:07:09 14:20:49+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 134144
InitializedDataSize: 196608
UninitializedDataSize: -
EntryPoint: 0x8d98
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ned32.exe ned32.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7176"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7196"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exeNED32.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7932C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
670
Read events
670
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\NED32.exe.manifestxml
MD5:05048C3C0419B935C264CFA3D7612FD6
SHA256:BF7C46BE26D84843F8C859E6790B02743068C0AD690C6E3582A5E60356DEE51C
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\cryptography.hazmat.bindings._constant_time.pydexecutable
MD5:6B546A14563972ED1D53A56B75B46918
SHA256:AB5D91858C20B3F2351AE7DF4C011DC0D0209F92E22DED3821D72A473DF56CB7
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\Microsoft.VC90.CRT.manifestxml
MD5:26A7382CB244C06D5CFBF839FA6C31FA
SHA256:4C63B22D7277DD51E1407245D994A864D1EEA5B7DBB0EE08111C7CF7FE9204FF
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_socket.pydexecutable
MD5:542726BB334376B4EE0B20CB19853CBB
SHA256:ED53D4157E38FF8AEC102A87FF7E2D6879B36EEFFD301726047F7517243AB279
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_hashlib.pydexecutable
MD5:C94E5379DC430BC98B676260A929C1C6
SHA256:11E2BA61C5D94999BACE0BD8AF8CE75DC10C2C494EBB4120367F7FC98209B61D
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_cffi_backend.pydexecutable
MD5:57A71F4B0E8F7D90D6F7E2C1D2F93B95
SHA256:FC25BCCF367CB1236E84568BF817B2906CC601C420F793B89BBBC279EBB55120
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\bz2.pydexecutable
MD5:F42A2FE6BB38E14CC0282FF85DBC8366
SHA256:72411F5D024CF86753EF40CBEACF564FB71410760035360F2C89932594082F5C
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\cryptography.hazmat.bindings._openssl.pydexecutable
MD5:D974266F3ED9EC1A03F137DC189C5FD5
SHA256:7EE0D8E8EB5FE5AF42450ED0CEA50930103F6BF010FE7E84EDDE696E81C73F24
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\pywintypes27.dllexecutable
MD5:4B069395A30715EAB3A94432AE6763D2
SHA256:6665FB5F1046447F6679CBEA58E228BCE84A952FC104C665A6B6626A8EE8A04F
7176NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI71762\_ssl.pydexecutable
MD5:1B4639E2970BC4A12E0715F161C26E15
SHA256:260F8AB785E3B22C241D578A5442FF287B1BF13A886B077A105F0E85D1C3A774
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
23
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7744
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7744
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.69
  • 40.126.31.71
  • 20.190.159.2
  • 40.126.31.2
  • 20.190.159.131
  • 40.126.31.73
  • 40.126.31.130
  • 40.126.31.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info