| File name: | malw.exe |
| Full analysis: | https://app.any.run/tasks/e4c72baf-5f99-40a0-9d67-ca26daab8531 |
| Verdict: | Malicious activity |
| Threats: | A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools. |
| Analysis date: | October 16, 2024, 11:45:21 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows |
| MD5: | 47CDA90A6BD1ACF43023271EC85128B1 |
| SHA1: | 8E61EB3FAA1434D687531C46CFDC4F8030F7F214 |
| SHA256: | 03BBC95CC519A5DBA31556B9CAA15F73EB3B72A63F6DE2EAD954C590F6A15A60 |
| SSDEEP: | 49152:DXkunOR6e3ViDWQRa7ALTEFSfgjxzO8m4bDwYtJucbsgPH+N7xS4u/nc5Um9ExBx:Yn6e3Vs1TEQgj5OzoPucwI87E7/c5Umm |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:10:14 05:24:40+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 8 |
| CodeSize: | 925696 |
| InitializedDataSize: | 1536 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x0000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | Dwetn |
| FileVersion: | 1.0.0.0 |
| InternalName: | Dwetn.exe |
| LegalCopyright: | Copyright © 2013 |
| LegalTrademarks: | - |
| OriginalFileName: | Dwetn.exe |
| ProductName: | Dwetn |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2172 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2380 | "C:\Users\admin\AppData\Local\Temp\malw.exe" | C:\Users\admin\AppData\Local\Temp\malw.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Dwetn Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2652 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6268 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Version: 4.8.9037.0 built by: NET481REL1 Modules
SnakeKeylogger(PID) Process(6268) InstallUtil.exe Keys DES6fc98cd68a1aab8b Options Telegram Bot Token7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc Telegram Chat ID6012493587 ims-api(PID) Process(6268) InstallUtil.exe Telegram-Tokens (1)7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc Telegram-Info-Links 7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc Get info about bothttps://api.telegram.org/bot7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc/getMe Get incoming updateshttps://api.telegram.org/bot7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc/getUpdates Get webhookhttps://api.telegram.org/bot7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc/getWebhookInfo Delete webhookhttps://api.telegram.org/bot7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc/deleteWebhook?drop_pending_updates=true Telegram-Requests Token7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc End-PointsendDocument Args chat_id (1)6012493587 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake Token7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc End-PointsendDocument Args chat_id (1)6012493587 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake Token7360473287:AAGU8TbAS0pKW-ar5EIAK0muDb5ps30GBZc End-PointsendDocument Args chat_id (1)6012493587 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake HTTP/1.1
Content-Type: multipart/form-data; boundary=------------------------8dcedd80b849da4
Host: api.telegram.org
Content-Length: 724
Connection: Keep-Alive Telegram-Responses oktrue result message_id96 from id7360473287 is_bottrue first_namesnakepan22 usernamesnakepan22bot chat id6012493587 first_nameD last_nameWilford usernameWil_ford typeprivate date1729079134 document file_nameSnakePW.txt mime_typetext/plain file_idBQACAgQAAxkDAANgZw-nXoQydaaQYCWDs-fegc7tEtUAAqEYAALoKHlQq-fqtfUU_5g2BA file_unique_idAgADoRgAAugoeVA file_size512 captionPc Name: admin | Snake Tracker
PW | admin | Snake | |||||||||||||||
| 7056 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2380) malw.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Gorfdhdi |
Value: C:\Users\admin\AppData\Roaming\Gorfdhdi.exe | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6268) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2380 | malw.exe | C:\Users\admin\AppData\Roaming\Gorfdhdi.exe | executable | |
MD5:47CDA90A6BD1ACF43023271EC85128B1 | SHA256:03BBC95CC519A5DBA31556B9CAA15F73EB3B72A63F6DE2EAD954C590F6A15A60 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
6268 | InstallUtil.exe | GET | 200 | 193.122.6.168:80 | http://checkip.dyndns.org/ | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4568 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5488 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4360 | SearchApp.exe | 2.23.209.142:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
6944 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6268 | InstallUtil.exe | 193.122.6.168:80 | checkip.dyndns.org | ORACLE-BMC-31898 | DE | shared |
6268 | InstallUtil.exe | 188.114.96.3:443 | reallyfreegeoip.org | CLOUDFLARENET | NL | malicious |
4376 | svchost.exe | 40.126.32.76:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
checkip.dyndns.org |
| shared |
reallyfreegeoip.org |
| malicious |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
api.telegram.org |
| shared |
go.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2172 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
6268 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
6268 | InstallUtil.exe | Misc activity | ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI |
6268 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
6268 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
6268 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
2172 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org) |
2172 | svchost.exe | Misc activity | ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) |
6268 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO 404/Snake/Matiex Keylogger Style External IP Check |
6268 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |