File name:

Adobe Flash Player.rar

Full analysis: https://app.any.run/tasks/39d7d49f-2b2e-4094-be6e-51db94ef6cf3
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: August 20, 2024, 10:29:59
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
snake
keylogger
dyndns
netreactor
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

C4CCDC83C0195F5B16FC00FB9644D0FA

SHA1:

93344DE47926F061B3CCBD553A54235AD4AB77B4

SHA256:

30A20AADBEC178DCFF20D87F9B995AF8717AA0251B37CCD8D504CCB92BFA4C43

SSDEEP:

49152:SpwQhmtyDhS/RV0vg5x78NwOmP4FfowlWT9J94CmcHUZtbGX0mt+2qZi39d9A00k:SpwQh/Ds/RkSxgNwOmQFgwl8x4N00mt1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Adobe Flash Player.exe (PID: 6956)
    • Create files in the Startup directory

      • name.exe (PID: 7128)
    • Connects to the CnC server

      • Synaptics.exe (PID: 7072)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 2584)
    • Scans artifacts that could help determine the target

      • RegSvcs.exe (PID: 2584)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 2584)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 2584)
    • SNAKE has been detected (YARA)

      • RegSvcs.exe (PID: 2584)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 6648)
      • Adobe Flash Player.exe (PID: 6956)
      • ._cache_Adobe Flash Player.exe (PID: 7004)
    • Executable content was dropped or overwritten

      • Adobe Flash Player.exe (PID: 6956)
      • ._cache_Adobe Flash Player.exe (PID: 7004)
    • Reads security settings of Internet Explorer

      • Adobe Flash Player.exe (PID: 6956)
      • Synaptics.exe (PID: 7072)
    • Reads the date of Windows installation

      • Adobe Flash Player.exe (PID: 6956)
    • Starts itself from another location

      • ._cache_Adobe Flash Player.exe (PID: 7004)
    • Contacting a server suspected of hosting an CnC

      • Synaptics.exe (PID: 7072)
    • Checks for external IP

      • svchost.exe (PID: 2256)
      • RegSvcs.exe (PID: 2584)
    • There is functionality for taking screenshot (YARA)

      • Synaptics.exe (PID: 7072)
    • There is functionality for communication over UDP network (YARA)

      • Synaptics.exe (PID: 7072)
    • There is functionality for communication dyndns network (YARA)

      • Synaptics.exe (PID: 7072)
    • The process verifies whether the antivirus software is installed

      • RegSvcs.exe (PID: 2584)
    • Checks Windows Trust Settings

      • Synaptics.exe (PID: 7072)
  • INFO

    • Checks supported languages

      • Adobe Flash Player.exe (PID: 6956)
      • Synaptics.exe (PID: 7072)
      • name.exe (PID: 7128)
      • RegSvcs.exe (PID: 2584)
      • ._cache_Adobe Flash Player.exe (PID: 7004)
    • Reads the computer name

      • Adobe Flash Player.exe (PID: 6956)
      • ._cache_Adobe Flash Player.exe (PID: 7004)
      • Synaptics.exe (PID: 7072)
      • name.exe (PID: 7128)
      • RegSvcs.exe (PID: 2584)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6648)
    • Manual execution by a user

      • Adobe Flash Player.exe (PID: 6956)
    • Process checks computer location settings

      • Adobe Flash Player.exe (PID: 6956)
    • Create files in a temporary directory

      • ._cache_Adobe Flash Player.exe (PID: 7004)
      • name.exe (PID: 7128)
      • Synaptics.exe (PID: 7072)
    • Creates files in the program directory

      • Adobe Flash Player.exe (PID: 6956)
      • Synaptics.exe (PID: 7072)
    • Reads mouse settings

      • ._cache_Adobe Flash Player.exe (PID: 7004)
      • name.exe (PID: 7128)
    • Creates files or folders in the user directory

      • ._cache_Adobe Flash Player.exe (PID: 7004)
      • name.exe (PID: 7128)
      • Synaptics.exe (PID: 7072)
    • Reads the machine GUID from the registry

      • ._cache_Adobe Flash Player.exe (PID: 7004)
      • RegSvcs.exe (PID: 2584)
      • Synaptics.exe (PID: 7072)
    • Checks proxy server information

      • Synaptics.exe (PID: 7072)
      • RegSvcs.exe (PID: 2584)
    • Disables trace logs

      • RegSvcs.exe (PID: 2584)
    • Reads Environment values

      • RegSvcs.exe (PID: 2584)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 2584)
      • Synaptics.exe (PID: 7072)
    • Reads Microsoft Office registry keys

      • RegSvcs.exe (PID: 2584)
    • .NET Reactor protector has been detected

      • RegSvcs.exe (PID: 2584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(2584) RegSvcs.exe
Keys
DES6fc98cd6
Options
Telegram Bot Token7362576928:AAGEU8rcOmNnBJlp9Hlb8HpORMqfMHPhnjs
Telegram Chat ID6475103768
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
7
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe adobe flash player.exe ._cache_adobe flash player.exe THREAT synaptics.exe name.exe #SNAKEKEYLOGGER regsvcs.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2584"C:\Users\admin\Desktop\._cache_Adobe Flash Player.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
name.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
SnakeKeylogger
(PID) Process(2584) RegSvcs.exe
Keys
DES6fc98cd6
Options
Telegram Bot Token7362576928:AAGEU8rcOmNnBJlp9Hlb8HpORMqfMHPhnjs
Telegram Chat ID6475103768
6648"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Adobe Flash Player.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6956"C:\Users\admin\Desktop\Adobe Flash Player.exe" C:\Users\admin\Desktop\Adobe Flash Player.exe
explorer.exe
User:
admin
Company:
Synaptics
Integrity Level:
MEDIUM
Description:
Synaptics Pointing Device Driver
Exit code:
0
Version:
1.0.0.4
Modules
Images
c:\users\admin\desktop\adobe flash player.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7004"C:\Users\admin\Desktop\._cache_Adobe Flash Player.exe" C:\Users\admin\Desktop\._cache_Adobe Flash Player.exe
Adobe Flash Player.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\._cache_adobe flash player.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7072"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdateC:\ProgramData\Synaptics\Synaptics.exe
Adobe Flash Player.exe
User:
admin
Company:
Synaptics
Integrity Level:
HIGH
Description:
Synaptics Pointing Device Driver
Version:
1.0.0.4
Modules
Images
c:\programdata\synaptics\synaptics.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7128"C:\Users\admin\Desktop\._cache_Adobe Flash Player.exe" C:\Users\admin\AppData\Local\directory\name.exe
._cache_Adobe Flash Player.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\directory\name.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
Total events
10 389
Read events
10 334
Write events
55
Delete events
0

Modification events

(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Adobe Flash Player.rar
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
6
Suspicious files
14
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6956Adobe Flash Player.exeC:\ProgramData\Synaptics\Synaptics.exeexecutable
MD5:F06E61E3BAB70ADBF5499B603CE5C4B5
SHA256:79D2FA8388FB659AF40FDA6FE74A7D476514FE5CBE96D68046F74CBB7DB9B6F0
6648WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6648.11737\Adobe Flash Player.exeexecutable
MD5:F06E61E3BAB70ADBF5499B603CE5C4B5
SHA256:79D2FA8388FB659AF40FDA6FE74A7D476514FE5CBE96D68046F74CBB7DB9B6F0
6956Adobe Flash Player.exeC:\ProgramData\Synaptics\RCXF181.tmpexecutable
MD5:C9678D257A3CF5E7548293FD74D17B74
SHA256:CDE26883AC565A6A89E7F0E84ED2FCBA01D3B2C8ADC56827679EA21C14A9C1EB
7004._cache_Adobe Flash Player.exeC:\Users\admin\AppData\Local\Temp\palladizebinary
MD5:A27F7271920B9CC2B01476C9541BBF0D
SHA256:33A5A0477CC888CADDF53A05C5AF5F264E9AAC5B8EB2C05FB8358DC57DC30BAD
7072Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:E1F795EAB7890F1261F827D23B47CFFC
SHA256:128FB77618551729995341E21247D1CD97A2267D9A3780B323C83951D231631C
7072Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552binary
MD5:172452BEA522E4B554EDB6392BDBD482
SHA256:DAD6ABE355C0B73EC81659914A0E066422976887E6528FC748214D5BA8E39FB1
7128name.exeC:\Users\admin\AppData\Local\Temp\autF6D1.tmpbinary
MD5:9B53C6AA5E201BBC12A69AD2D4C8413A
SHA256:7A043F7EE97217E679771F7D476B07EC6DA8E6F6A8F55DDFF3B0EA819FEA07BA
7128name.exeC:\Users\admin\AppData\Local\Temp\autF6B1.tmpbinary
MD5:C124B7EF71A59BFBA1B8D170D1070EBC
SHA256:B913EFA5C0D3134C24967ECA443F7EAD72FC6E168F40E83BA1DDD682D61E39BF
7004._cache_Adobe Flash Player.exeC:\Users\admin\AppData\Local\directory\name.exeexecutable
MD5:4C38949261E48D38D51AB652ABDE0F96
SHA256:1EAED2D702412B04DEF536D1D042BC350E5127C883DE4EB3C1B961449DAE5CBD
7072Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552binary
MD5:3A315F91EC10329896BB8B54B6716D19
SHA256:CD5AA818673116F807B007DADFC2C40EF0C56A10FFCCE2B196A47471D4834596
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
45
DNS requests
26
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7072
Synaptics.exe
GET
200
69.42.215.252:80
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
unknown
whitelisted
2228
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
6644
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2584
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2904
RUXIMICS.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1492
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1492
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2256
svchost.exe
224.0.0.252:5355
whitelisted
7072
Synaptics.exe
69.42.215.252:80
freedns.afraid.org
AWKNET
US
unknown
2256
svchost.exe
224.0.0.251:5353
unknown
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
xred.mooo.com
whitelisted
freedns.afraid.org
  • 69.42.215.252
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.72
  • 20.190.160.14
  • 40.126.32.136
  • 40.126.32.68
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
checkip.dyndns.org
  • 132.226.8.169
  • 193.122.6.168
  • 193.122.130.0
  • 158.101.44.242
  • 132.226.247.73
shared
reallyfreegeoip.org
  • 188.114.97.3
  • 188.114.96.3
malicious
arc.msn.com
  • 20.223.35.26
  • 20.31.169.57
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com
2256
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org)
2584
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
2584
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
2584
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
2584
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
2584
RegSvcs.exe
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
2256
svchost.exe
Misc activity
ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org)
2584
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
2584
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
3 ETPRO signatures available at the full report
No debug info