File name:

KeyboardSplitter.exe

Full analysis: https://app.any.run/tasks/4cc3aecc-a62b-4e9f-bb33-668c0df865d3
Verdict: Malicious activity
Analysis date: November 22, 2024, 13:42:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

81E89981CEBF899BD3EE985A88A63D53

SHA1:

67C2733322E10475A91C9AD4805FE478662A7B0B

SHA256:

36656BC7DF1C724AFECEA974A85533D83D1BCA3675DC541E42CD2592AF00EE77

SSDEEP:

98304:o1tpy43QTufo7h3XFvfXMWMmyHoeRzCueFrq3bOBqygpCtyawall0XtkPp1DQvQL:o8bhLytkgZqeUJi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • keyboard_driver.exe (PID: 6212)
      • KeyboardSplitter.exe (PID: 1156)
      • devcon.exe (PID: 6280)
      • drvinst.exe (PID: 6448)
      • drvinst.exe (PID: 6664)
    • Process drops legitimate windows executable

      • KeyboardSplitter.exe (PID: 1156)
      • devcon.exe (PID: 6280)
      • drvinst.exe (PID: 6448)
      • drvinst.exe (PID: 6664)
    • Drops a system driver (possible attempt to evade defenses)

      • keyboard_driver.exe (PID: 6212)
      • KeyboardSplitter.exe (PID: 1156)
      • devcon.exe (PID: 6280)
      • drvinst.exe (PID: 6448)
      • drvinst.exe (PID: 6664)
    • Starts a Microsoft application from unusual location

      • devcon.exe (PID: 6280)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (45.4)
.exe | InstallShield setup (26.7)
.exe | Win64 Executable (generic) (17.1)
.dll | Win32 Dynamic Link Library (generic) (4)
.exe | Win32 Executable (generic) (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:28 12:31:47+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 6309888
InitializedDataSize: 374784
UninitializedDataSize: -
EntryPoint: 0x6067de
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
FileVersionNumber: 2.3.0.0
ProductVersionNumber: 2.3.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Keyboard Splitter (Creates up to 4 virtual xbox 360 contollers and feeds them using keyboards and/or mice)
CompanyName: djlastnight
FileDescription: Keyboard Splitter
FileVersion: 2.3.0.0
InternalName: KeyboardSplitter.exe
LegalCopyright: Copyright © 2023
OriginalFileName: KeyboardSplitter.exe
ProductName: djlastnight's Gaming Keyboard Splitter
ProductVersion: 2.3.0.0
AssemblyVersion: 2.3.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
10
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start keyboardsplitter.exe conhost.exe no specs keyboard_driver.exe conhost.exe no specs devcon.exe conhost.exe no specs drvinst.exe rundll32.exe no specs drvinst.exe keyboardsplitter.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1156"C:\Users\admin\Desktop\KeyboardSplitter.exe" C:\Users\admin\Desktop\KeyboardSplitter.exe
explorer.exe
User:
admin
Company:
djlastnight
Integrity Level:
HIGH
Description:
Keyboard Splitter
Version:
2.3.0.0
Modules
Images
c:\users\admin\desktop\keyboardsplitter.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4420"C:\Users\admin\Desktop\KeyboardSplitter.exe" C:\Users\admin\Desktop\KeyboardSplitter.exeexplorer.exe
User:
admin
Company:
djlastnight
Integrity Level:
MEDIUM
Description:
Keyboard Splitter
Exit code:
3221226540
Version:
2.3.0.0
Modules
Images
c:\users\admin\desktop\keyboardsplitter.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeKeyboardSplitter.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6212"C:\Users\admin\AppData\Local\Temp\KeyboardSplitter 2.3.0.0 resources\keyboard_driver.exe" /installC:\Users\admin\AppData\Local\Temp\KeyboardSplitter 2.3.0.0 resources\keyboard_driver.exe
KeyboardSplitter.exe
User:
admin
Company:
Francisco Lopes
Integrity Level:
HIGH
Description:
Interception command line installation tool
Exit code:
0
Version:
1.00 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\keyboardsplitter 2.3.0.0 resources\keyboard_driver.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6220\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exekeyboard_driver.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6280"C:\Users\admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\devcon.exe" install ScpVBus.inf Root\ScpVBusC:\Users\admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\devcon.exe
KeyboardSplitter.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
10.0.10240.16399 (th1.150722-1625)
Modules
Images
c:\users\admin\appdata\local\temp\virtualxbox 2.2.0.0 resources\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6288\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exedevcon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6448DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{cc05fdd0-c885-7643-85f1-464cdced529e}\scpvbus.inf" "9" "4b5cfab93" "00000000000000F0" "WinSta0\Default" "00000000000001D4" "208" "c:\users\admin\appdata\local\temp\virtualxbox 2.2.0.0 resources"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
6476rundll32.exe C:\WINDOWS\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{b9b4c18e-4e7c-6a42-977b-80d0a757683b} Global\{2d140c59-a01a-4a48-9698-c28b536fdcfd} C:\WINDOWS\System32\DriverStore\Temp\{cbf9f1ba-a0fb-0841-8610-8afc2bbb5c29}\scpvbus.inf C:\WINDOWS\System32\DriverStore\Temp\{cbf9f1ba-a0fb-0841-8610-8afc2bbb5c29}\ScpVBus.catC:\Windows\System32\rundll32.exedrvinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6664DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\WINDOWS\INF\oem1.inf" "oem1.inf:c14ce88487555a35:ScpVBus_Device:22.52.24.182:root\scpvbus," "4b5cfab93" "00000000000000F0"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
Total events
11 254
Read events
11 216
Write events
28
Delete events
10

Modification events

(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\keyboard
Operation:writeName:DisplayName
Value:
Keyboard Upper Filter Driver
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\keyboard
Operation:writeName:Type
Value:
1
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\keyboard
Operation:writeName:ErrorControl
Value:
1
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\keyboard
Operation:writeName:Start
Value:
3
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mouse
Operation:writeName:DisplayName
Value:
Mouse Upper Filter Driver
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mouse
Operation:writeName:Type
Value:
1
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mouse
Operation:writeName:ErrorControl
Value:
1
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mouse
Operation:writeName:Start
Value:
3
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}
Operation:writeName:UpperFilters
Value:
keyboard
(PID) Process:(6212) keyboard_driver.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
Operation:writeName:UpperFilters
Value:
mouse
Executable files
21
Suspicious files
10
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
1156KeyboardSplitter.exeC:\Users\admin\Desktop\splitter_log.txttext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
1156KeyboardSplitter.exeC:\Users\admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\WdfCoinstaller01009.dllexecutable
MD5:4DA5DA193E0E4F86F6F8FD43EF25329A
SHA256:18487B4FF94EDCCC98ED59D9FCA662D4A1331C5F1E14DF8DB3093256DD9F1C3E
1156KeyboardSplitter.exeC:\Users\admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\ScpVBus.sysexecutable
MD5:6011AB0CA3D08527CF2AF246D792548F
SHA256:2C363A38F474ABE214D947F4E8C5D246A65228F4FF1F56C65EC66253A38F04E8
6280devcon.exeC:\Users\admin\AppData\Local\Temp\{cc05fdd0-c885-7643-85f1-464cdced529e}\scpvbus.infbinary
MD5:C554A925EB6C46DA1A6E221AACEC157B
SHA256:DB8367C5E7E9B0A857D9F4D220A08D475381440F793D9408071E16A865ECCD51
6280devcon.exeC:\Users\admin\AppData\Local\Temp\{cc05fdd0-c885-7643-85f1-464cdced529e}\SETCA02.tmpexecutable
MD5:4DA5DA193E0E4F86F6F8FD43EF25329A
SHA256:18487B4FF94EDCCC98ED59D9FCA662D4A1331C5F1E14DF8DB3093256DD9F1C3E
1156KeyboardSplitter.exeC:\Users\admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\ScpVBus.infbinary
MD5:C554A925EB6C46DA1A6E221AACEC157B
SHA256:DB8367C5E7E9B0A857D9F4D220A08D475381440F793D9408071E16A865ECCD51
6212keyboard_driver.exeC:\Windows\System32\drivers\mouse.sysexecutable
MD5:CCF564011EEFA7B44D74915D231B8FD7
SHA256:0F12D47D01864CA5E1EB663A52B3D2C060521E57B68FF99D70E7F01506E400F9
1156KeyboardSplitter.exeC:\Users\admin\AppData\Local\Temp\VirtualXbox 2.2.0.0 resources\scpvbus.catcat
MD5:F731EB640512970DA863BB207C911AFB
SHA256:E7CD617710F38C80F0E8700780A92C97C5B2DDC42586DE1D8AFBD2E624225629
6280devcon.exeC:\Users\admin\AppData\Local\Temp\{cc05fdd0-c885-7643-85f1-464cdced529e}\ScpVBus.catcat
MD5:F731EB640512970DA863BB207C911AFB
SHA256:E7CD617710F38C80F0E8700780A92C97C5B2DDC42586DE1D8AFBD2E624225629
6280devcon.exeC:\Users\admin\AppData\Local\Temp\{cc05fdd0-c885-7643-85f1-464cdced529e}\SETCA33.tmpbinary
MD5:C554A925EB6C46DA1A6E221AACEC157B
SHA256:DB8367C5E7E9B0A857D9F4D220A08D475381440F793D9408071E16A865ECCD51
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
35
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6576
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6576
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.161:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4932
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 172.217.18.110
whitelisted
www.bing.com
  • 2.23.209.161
  • 2.23.209.187
  • 2.23.209.189
  • 2.23.209.181
  • 2.23.209.177
  • 2.23.209.179
  • 2.23.209.176
  • 2.23.209.182
  • 2.23.209.185
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.73
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.23
  • 40.126.31.67
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info