File name:

1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe

Full analysis: https://app.any.run/tasks/0deed652-38e4-4539-8a95-a41ff72f148f
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: January 09, 2025, 04:31:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
masslogger
evasion
snake
keylogger
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

603580E2CF9FA1F1213CE4632509B3D4

SHA1:

E79A0ADE9D5DE0009B62973086DE11736E16777E

SHA256:

1FDA74A0B6DA577D507DD6155C931B44C1B9D4A35AE1899F5410FC1B5FA96DED

SSDEEP:

49152:gHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZX:xAGQX21RBt7QjTmcaTH/vU4do9Pcjq1o

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MASSLOGGER has been found (auto)

      • 1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe (PID: 6420)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 6488)
  • SUSPICIOUS

    • Checks for external IP

      • svchost.exe (PID: 2192)
      • RegSvcs.exe (PID: 6488)
    • Executes application which crashes

      • RegSvcs.exe (PID: 6488)
  • INFO

    • The sample compiled with english language support

      • 1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe (PID: 6420)
    • Reads mouse settings

      • 1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe (PID: 6420)
    • Create files in a temporary directory

      • 1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe (PID: 6420)
    • Checks supported languages

      • RegSvcs.exe (PID: 6488)
      • 1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe (PID: 6420)
    • Reads the computer name

      • RegSvcs.exe (PID: 6488)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6488)
    • Disables trace logs

      • RegSvcs.exe (PID: 6488)
    • Checks proxy server information

      • RegSvcs.exe (PID: 6488)
      • WerFault.exe (PID: 6956)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6956)
    • Reads the software policy settings

      • WerFault.exe (PID: 6956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:11 12:39:47+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 362496
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe no specs #SNAKEKEYLOGGER regsvcs.exe svchost.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6420"C:\Users\admin\AppData\Local\Temp\1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe" C:\Users\admin\AppData\Local\Temp\1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6488"C:\Users\admin\AppData\Local\Temp\1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
1fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
3762504530
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6956C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6488 -s 1516C:\Windows\SysWOW64\WerFault.exe
RegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 914
Read events
3 900
Write events
14
Delete events
0

Modification events

(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6488) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
8
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6956WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_RegSvcs.exe_aade347ff118594c6fa6b5528681e4139a540be_04866db2_1747b22d-8cb6-44f1-a379-252e8ccee928\Report.wer
MD5:
SHA256:
6956WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\RegSvcs.exe.6488.dmp
MD5:
SHA256:
6956WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7BEC.tmp.xmlxml
MD5:5A7EF623375E4E6AE781D5A6BB2483E0
SHA256:11B3934EB853BE1B41F4E22DA4E2639B1CF409678668FBBC23F7BB84CEC4C128
64201fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exeC:\Users\admin\AppData\Local\Temp\deblaterationbinary
MD5:3FD5F3C83ADC855217F31245E24696ED
SHA256:DDFF03D0F4F1F85D19F1FAEC27545E1071C5236550A1039286153A18AD49A780
6956WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7BAC.tmp.WERInternalMetadata.xmlxml
MD5:3704231334E09154EE7F1F02519AF84C
SHA256:5DBD9865857E71AA431B7F6D3AB7344303CAFE2A948EB0C67217537E7DF4BBA0
6956WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:69B541228C019A572BAB205474E0CB06
SHA256:5AA0BE8AB20E250AFFC47D79051CC09C4A6DA6CFC58DCD105873A01B56938DD3
64201fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exeC:\Users\admin\AppData\Local\Temp\embowelingtext
MD5:604AC4471C9434A1C887209A833A8543
SHA256:B729BD19AE652BDF525D53928F85352C2552FFA6AD68861906EA11908EA6A29D
64201fda74a0b6da577d507dd6155c931b44c1b9d4a35ae1899f5410fc1b5fa96ded.exeC:\Users\admin\AppData\Local\Temp\aut5D17.tmpbinary
MD5:144AC57A24CDB9DE51D0FB502E60181E
SHA256:6693824EBE67E1C70EBF0361DB5AB8D5A0CD22309D27CFDECA452F7AA2FA5C72
6956WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6956WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
37
DNS requests
21
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.20.245.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.20.245.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6488
RegSvcs.exe
GET
502
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
6956
WerFault.exe
GET
200
2.20.245.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6956
WerFault.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7156
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.20.245.138:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4712
MoUsoCoreWorker.exe
2.20.245.138:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
2972
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6488
RegSvcs.exe
132.226.8.169:80
checkip.dyndns.org
ORACLE-BMC-31898
JP
shared
5892
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 2.20.245.138
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 184.30.230.103
  • 95.101.149.131
whitelisted
checkip.dyndns.org
  • 132.226.8.169
  • 132.226.247.73
  • 193.122.6.168
  • 158.101.44.242
  • 193.122.130.0
shared
ocsp.digicert.com
  • 192.229.221.95
whitelisted
watson.events.data.microsoft.com
  • 52.182.143.212
unknown
login.live.com
  • 20.190.160.22
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.136
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.134
  • 40.126.32.72
whitelisted
go.microsoft.com
  • 23.56.254.14
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org)
6488
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
6488
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
No debug info