File name:

snoop_cli.exe

Full analysis: https://app.any.run/tasks/abc96494-6129-43bf-9b34-c8ad4ab32018
Verdict: Malicious activity
Analysis date: May 15, 2025, 20:16:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

DB0F8319E96F8E3645865284882C0899

SHA1:

EADB5A422F3BFE8367E4286159A588171CD690D2

SHA256:

653E41F51CAE2DDF5F62FD809838182EE817EB9C3F35FACC04C9C3210579ACF3

SSDEEP:

196608:AOD0iuv5WrAYDUMQ2OiIrARkY8HjtPlDM:nD0iuREAy24RkBPl4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • snoop_cli.exe (PID: 1912)
    • Process drops python dynamic module

      • snoop_cli.exe (PID: 1912)
    • Starts CMD.EXE for commands execution

      • snoop_cli.exe (PID: 6028)
    • Loads Python modules

      • snoop_cli.exe (PID: 6028)
    • The process drops C-runtime libraries

      • snoop_cli.exe (PID: 1912)
    • Application launched itself

      • snoop_cli.exe (PID: 1912)
    • Executable content was dropped or overwritten

      • snoop_cli.exe (PID: 1912)
  • INFO

    • Reads the computer name

      • snoop_cli.exe (PID: 6028)
      • snoop_cli.exe (PID: 1912)
    • Create files in a temporary directory

      • snoop_cli.exe (PID: 1912)
    • The sample compiled with english language support

      • snoop_cli.exe (PID: 1912)
    • Reads the machine GUID from the registry

      • snoop_cli.exe (PID: 6028)
    • Checks supported languages

      • snoop_cli.exe (PID: 6028)
      • snoop_cli.exe (PID: 1912)
    • Checks operating system version

      • snoop_cli.exe (PID: 6028)
    • Creates files or folders in the user directory

      • snoop_cli.exe (PID: 6028)
    • Reads the software policy settings

      • slui.exe (PID: 4692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:31 11:39:12+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.34
CodeSize: 151552
InitializedDataSize: 694272
UninitializedDataSize: -
EntryPoint: 0x99e0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start snoop_cli.exe conhost.exe no specs snoop_cli.exe no specs cmd.exe no specs sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1912"C:\Users\admin\AppData\Local\Temp\snoop_cli.exe" C:\Users\admin\AppData\Local\Temp\snoop_cli.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\snoop_cli.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4692"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5072C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\SysWOW64\cmd.exesnoop_cli.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5260C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6028"C:\Users\admin\AppData\Local\Temp\snoop_cli.exe" C:\Users\admin\AppData\Local\Temp\snoop_cli.exesnoop_cli.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\snoop_cli.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesnoop_cli.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6264C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
800
Read events
800
Write events
0
Delete events
0

Modification events

No data
Executable files
61
Suspicious files
5
Text files
41
Unknown types
0

Dropped files

PID
Process
Filename
Type
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\_decimal.pydexecutable
MD5:1FF7408362C06CE1C23D8E371CE18A16
SHA256:44107DF49D7DBEA4E5D1C7F8A24B2D30C7F4D1623F599C4EA9F5F36C05FE0EE6
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\_elementtree.pydexecutable
MD5:1E5920AFADD11C90ADCE867F0E0CD406
SHA256:ACBD9EC39CED8B521DD637209F88C366C455A18C884D8F02BBEDDCF50DC7AF6B
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CBF71221E765AAE3E12E49481DEF8FC1
SHA256:A33F612232F015C13F190A8C11317CAE0C84995D655CBCB28AF2844BF2A98954
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\_ssl.pydexecutable
MD5:54BCEB21E1D683B68D58E063F55AE22E
SHA256:5DC85DD0BEE9EF96C1F278398CC7AF36DE2F3721DCE726A4B13D64BD63EABC39
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:7EB68DD1ECA8E2EE10C253574511922D
SHA256:00AA3783B5AB8595DDD92AB061A70C786B375067032B1B59CA334D0C02CB286F
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\_lzma.pydexecutable
MD5:B23D17B4B3B15DAB84E384B8DD1D8FC6
SHA256:D3350AD957D6C37B2C75F56A5A149F0EEB58295227F78C15048669A2E816AE3A
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\_queue.pydexecutable
MD5:D4D66184D157D9DD8C8337E75EB03914
SHA256:E8D293CF77B9F94395C18A26CE38CC1CA01A183DB3E9105ED9040338EA252AE4
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\_multiprocessing.pydexecutable
MD5:26D9F2A3CDF70306E43828F0371570F6
SHA256:0913C9B7A21FE0ABD97E27194FB2D5744CA121561D9FDEA71D1A9409B93A8FFF
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:B81E3E9FF561E1800F058E2E09B84780
SHA256:F60489A3EACD6B701F8C71F40A0AA2FE5CBA0F2EA9D626824663BF00B0B15EDF
1912snoop_cli.exeC:\Users\admin\AppData\Local\Temp\_MEI19122\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:D3362E7ED2FED334339A32DFE44123DE
SHA256:37C65668410126486898DD2EA02374834219857A6836175B21BE3568C6931DA9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
24
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1052
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1052
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.138:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.138:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.48.23.138
  • 23.48.23.195
  • 23.48.23.139
  • 23.48.23.134
  • 23.48.23.143
  • 23.48.23.145
  • 23.48.23.140
  • 23.48.23.194
  • 23.48.23.190
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.138
  • 20.190.160.131
  • 40.126.32.140
  • 20.190.160.14
  • 20.190.160.2
  • 20.190.160.4
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info