File name:

HEUR-Trojan.MSIL.Crypt.gen-4a729e3034aec521839633877b5939ccac918ca217dac42e6d5fccc35b3e06c1.7z

Full analysis: https://app.any.run/tasks/d01cd129-6280-4a82-890b-1b22311f3b6f
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: February 28, 2025, 18:04:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
netreactor
evasion
snake
keylogger
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

BB90C6562D61A57231DE5E0E62842001

SHA1:

5389185DB36E8D410D765FB3A3B928EF15034E4F

SHA256:

21E2C83DA4D1A7D80934C39CEE2C83E1965834C08E1B7B0635ADD3109A1E5EEA

SSDEEP:

49152:mtCK/O8pbitBnJd8P64Dx06dXYOgJ+8PZVY/N/bPoIgfD2Z9oLsCS8dJQa97gVS7:cCW7pbGBnJdUDaGXzW+AZVY/dzoJb232

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7332)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • Swift007.exe (PID: 6800)
    • Steals credentials from Web Browsers

      • Swift007.exe (PID: 6800)
    • Actions looks like stealing of personal data

      • Swift007.exe (PID: 6800)
  • SUSPICIOUS

    • Application launched itself

      • Swift007.exe (PID: 7316)
    • Checks for external IP

      • Swift007.exe (PID: 6800)
      • svchost.exe (PID: 2196)
    • Executes application which crashes

      • Swift007.exe (PID: 6800)
    • The process verifies whether the antivirus software is installed

      • Swift007.exe (PID: 6800)
  • INFO

    • Checks supported languages

      • Swift007.exe (PID: 7316)
      • Swift007.exe (PID: 6800)
    • Manual execution by a user

      • Swift007.exe (PID: 7316)
    • Disables trace logs

      • Swift007.exe (PID: 6800)
    • Reads the computer name

      • Swift007.exe (PID: 7316)
      • Swift007.exe (PID: 6800)
    • Reads the software policy settings

      • slui.exe (PID: 7520)
      • slui.exe (PID: 5596)
      • Swift007.exe (PID: 6800)
    • Reads the machine GUID from the registry

      • Swift007.exe (PID: 7316)
      • Swift007.exe (PID: 6800)
    • .NET Reactor protector has been detected

      • Swift007.exe (PID: 7316)
    • Checks proxy server information

      • Swift007.exe (PID: 6800)
      • slui.exe (PID: 5596)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 7744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2021:06:14 12:27:38+00:00
ArchivedFileName: Swift007.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe swift007.exe slui.exe #SNAKEKEYLOGGER swift007.exe svchost.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5596C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6800"C:\Users\admin\Desktop\Swift007.exe"C:\Users\admin\Desktop\Swift007.exe
Swift007.exe
User:
admin
Integrity Level:
HIGH
Description:
ProjectPrototype2
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\swift007.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7316"C:\Users\admin\Desktop\Swift007.exe" C:\Users\admin\Desktop\Swift007.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
ProjectPrototype2
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\swift007.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7332"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan.MSIL.Crypt.gen-4a729e3034aec521839633877b5939ccac918ca217dac42e6d5fccc35b3e06c1.7zC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7484C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
7520"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
7744C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6800 -s 1204C:\Windows\SysWOW64\WerFault.exeSwift007.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
5 035
Read events
4 996
Write events
36
Delete events
3

Modification events

(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan.MSIL.Crypt.gen-4a729e3034aec521839633877b5939ccac918ca217dac42e6d5fccc35b3e06c1.7z
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb7332.21368\Swift007.exe
MD5:
SHA256:
7744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Swift007.exe_92ec9defaf7777579ab675a882e378ca5939db_91a55e30_0d6fc062-c8ea-4331-a440-d171cda59f6a\Report.wer
MD5:
SHA256:
7744WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Swift007.exe.6800.dmp
MD5:
SHA256:
7744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER897D.tmp.xmlxml
MD5:68CEE9F36163045CCC307024D01A0637
SHA256:94DC72442C6285BFAF7341420EF9572BECB16C154B9009AEA5329928A5921629
7744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER8833.tmp.dmpbinary
MD5:72B2A3C8321D908553003A8C5BDD4C24
SHA256:1173798ECEFCF227BC7938C31DA2DD9D5873DF7FE7B72BA67A62F6BD4A160B08
7744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER895D.tmp.WERInternalMetadata.xmlxml
MD5:F5B664CEBC1C4A7FDE68EBE8EB7C3E70
SHA256:1ACF5A1B30610B714B94EDA773CAF57447F976B56EFB96C9E7893B923F1FFD27
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
27
DNS requests
18
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3096
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3096
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6800
Swift007.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
6800
Swift007.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2040
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3008
backgroundTaskHost.exe
2.19.122.19:443
www.bing.com
Akamai International B.V.
DE
whitelisted
7916
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3096
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.129
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.2
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.23
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
www.bing.com
  • 2.19.122.19
  • 2.19.122.17
  • 2.19.122.22
  • 2.19.122.15
  • 2.19.122.30
  • 2.19.122.13
  • 2.19.122.26
  • 2.19.122.10
  • 2.19.122.31
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 23.209.214.100
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
Device Retrieving External IP Address Detected
INFO [ANY.RUN] SNI External IP Domain Lookup (freegeoip .app)
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Checker Domain (freegeoip .app)
Potentially Bad Traffic
ET INFO External IP Lookup Domain Domain in DNS Lookup (ipbase .com)
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (ipbase .com in TLS SNI)
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
No debug info