File name:

NED32.exe

Full analysis: https://app.any.run/tasks/ec736004-c799-4cc6-ac89-9913a65874de
Verdict: Malicious activity
Analysis date: April 22, 2025, 00:05:29
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

7D13A4A2FB50491FC1A5672F0CBAB8A3

SHA1:

A8F799E28A905E0D07C82A5F6A9402C2C9F2BC6A

SHA256:

F703AA2110EE451AD1FC6F141AA99A8C8100C1516A5B8FCBDEB174A0665360E4

SSDEEP:

98304:mf5wdvi499js968CZ8cYnfPwt+LpawxfCiyliOIRBJnic5ziC3Ag9pf7B2rgM0tz:SQlQ1cD+mJ1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • NED32.exe (PID: 7352)
    • The process drops C-runtime libraries

      • NED32.exe (PID: 7352)
    • Executable content was dropped or overwritten

      • NED32.exe (PID: 7352)
    • Application launched itself

      • NED32.exe (PID: 7352)
    • Process drops python dynamic module

      • NED32.exe (PID: 7352)
    • There is functionality for taking screenshot (YARA)

      • NED32.exe (PID: 7372)
  • INFO

    • The sample compiled with english language support

      • NED32.exe (PID: 7352)
    • Checks supported languages

      • NED32.exe (PID: 7352)
      • NED32.exe (PID: 7372)
    • Create files in a temporary directory

      • NED32.exe (PID: 7352)
    • Reads the machine GUID from the registry

      • NED32.exe (PID: 7372)
    • Reads the computer name

      • NED32.exe (PID: 7372)
    • PyInstaller has been detected (YARA)

      • NED32.exe (PID: 7372)
      • NED32.exe (PID: 7352)
    • Reads the software policy settings

      • slui.exe (PID: 7424)
      • slui.exe (PID: 8152)
    • Checks proxy server information

      • slui.exe (PID: 8152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:07:09 14:20:49+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 134144
InitializedDataSize: 196608
UninitializedDataSize: -
EntryPoint: 0x8d98
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ned32.exe ned32.exe no specs sppextcomobj.exe no specs slui.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7352"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7372"C:\Users\admin\AppData\Local\Temp\NED32.exe" C:\Users\admin\AppData\Local\Temp\NED32.exeNED32.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ned32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7392C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7424"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8152C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 146
Read events
1 146
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\_ssl.pydexecutable
MD5:1B4639E2970BC4A12E0715F161C26E15
SHA256:260F8AB785E3B22C241D578A5442FF287B1BF13A886B077A105F0E85D1C3A774
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\_socket.pydexecutable
MD5:542726BB334376B4EE0B20CB19853CBB
SHA256:ED53D4157E38FF8AEC102A87FF7E2D6879B36EEFFD301726047F7517243AB279
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\cryptography.hazmat.bindings._constant_time.pydexecutable
MD5:6B546A14563972ED1D53A56B75B46918
SHA256:AB5D91858C20B3F2351AE7DF4C011DC0D0209F92E22DED3821D72A473DF56CB7
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\Microsoft.VC90.CRT.manifestxml
MD5:26A7382CB244C06D5CFBF839FA6C31FA
SHA256:4C63B22D7277DD51E1407245D994A864D1EEA5B7DBB0EE08111C7CF7FE9204FF
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\msvcm90.dllexecutable
MD5:EDE65ADA7411ABA6D538D599AD130E5F
SHA256:5AC8F77BCB2B4FE9AF85E9D8E89B373A231E46C40167E7BFC959CAF0BA86874E
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\python27.dllexecutable
MD5:3E35352C82FBCCDA9C372B8443F73E5E
SHA256:DCE00D476314CD4C812E3B5471B84588D532D33A5F39D40C726914A893B88D07
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\unicodedata.pydexecutable
MD5:252A1E38D86C07AC3A476DB9117E3453
SHA256:8473AE688C862CAF8F19CE6BB1BBBEC1DF8F44F9DDD3A9BE8294A52A0D7B4D93
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\cryptography.hazmat.bindings._padding.pydexecutable
MD5:BD750737B5E46412234E9B1328210F14
SHA256:BAAC59440251EA21203116E696613C20FCD41A10A0512C56D91C08173FA8B1EB
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\msvcp90.dllexecutable
MD5:5A04D3385603D4ED780D654E1219DB9D
SHA256:1A696D74D00EDD47F1EF90F9DCDB1BE9044D36D8DEAB7E1542E7A436D5F0ED25
7352NED32.exeC:\Users\admin\AppData\Local\Temp\_MEI73522\pyexpat.pydexecutable
MD5:9854C014A8EF7C4FD019C3A1D2C5D1AA
SHA256:DB794F7906C6436813286B9A717854644D55180B7D9BBCA595EAAD6809E121B6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
28
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.16.38.4:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.20.102.93:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6032
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.18.244.216:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7980
SIHClient.exe
GET
200
2.20.102.93:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7980
SIHClient.exe
GET
200
2.20.102.93:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.18.244.216:80
crl.microsoft.com
Akamai International B.V.
FR
whitelisted
5496
MoUsoCoreWorker.exe
2.20.102.93:80
www.microsoft.com
RCS & RDS
RO
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.66:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.16.38.4:80
ocsp.digicert.com
AKAMAI-AS
ES
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 216.58.212.142
whitelisted
crl.microsoft.com
  • 2.18.244.216
  • 2.18.244.211
whitelisted
www.microsoft.com
  • 2.20.102.93
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.66
  • 20.190.160.4
  • 40.126.32.74
  • 40.126.32.133
  • 40.126.32.72
  • 20.190.160.65
  • 20.190.160.14
  • 20.190.160.22
  • 20.190.160.131
  • 40.126.32.136
  • 20.190.160.67
  • 20.190.160.128
  • 20.190.160.5
  • 40.126.32.138
  • 20.190.160.2
whitelisted
ocsp.digicert.com
  • 2.16.38.4
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info