File name:

Urgent payment request 【紧急付款请求.exe

Full analysis: https://app.any.run/tasks/f1ad3435-55e9-4108-ad46-6eae41440504
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: January 30, 2025, 08:18:52
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
snake
keylogger
evasion
telegram
stealer
smtp
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

A236EA4360F7D7233B98BB87B032F067

SHA1:

7914EB53D0F98BA312B2494AC218B15779465062

SHA256:

8374C0F3CBE0440E2A5D84237360A4F4930A939E8F16655FB53DDFE9F8FD91FE

SSDEEP:

49152:+6WNkebmEFhOHGo4uh68QqyxBXSCXPGms1lw3F0YmKDSd0ujsE58Vq84wE8hnHkv:B4kEm2O0uh68QqoBXSCXPGms1lw3F0YR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 6564)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 6564)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 6564)
    • SNAKE has been detected (YARA)

      • RegSvcs.exe (PID: 6564)
  • SUSPICIOUS

    • Checks for external IP

      • RegSvcs.exe (PID: 6564)
      • svchost.exe (PID: 2192)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 6564)
    • Connects to SMTP port

      • RegSvcs.exe (PID: 6564)
    • The process verifies whether the antivirus software is installed

      • RegSvcs.exe (PID: 6564)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • RegSvcs.exe (PID: 6564)
  • INFO

    • Checks supported languages

      • Urgent payment request 【紧急付款请求.exe (PID: 6444)
      • RegSvcs.exe (PID: 6564)
    • Reads mouse settings

      • Urgent payment request 【紧急付款请求.exe (PID: 6444)
    • The sample compiled with english language support

      • Urgent payment request 【紧急付款请求.exe (PID: 6444)
    • Create files in a temporary directory

      • Urgent payment request 【紧急付款请求.exe (PID: 6444)
    • Reads the computer name

      • RegSvcs.exe (PID: 6564)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6564)
    • Disables trace logs

      • RegSvcs.exe (PID: 6564)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 6564)
    • Checks proxy server information

      • RegSvcs.exe (PID: 6564)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:29 23:12:38+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581632
InitializedDataSize: 433664
UninitializedDataSize: -
EntryPoint: 0x2800a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start urgent payment request 【紧急付款请求.exe no specs #SNAKEKEYLOGGER regsvcs.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6444"C:\Users\admin\AppData\Local\Temp\Urgent payment request 【紧急付款请求.exe" C:\Users\admin\AppData\Local\Temp\Urgent payment request 【紧急付款请求.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\urgent payment request 【紧急付款请求.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6564"C:\Users\admin\AppData\Local\Temp\Urgent payment request 【紧急付款请求.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
Urgent payment request 【紧急付款请求.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
1 291
Read events
1 277
Write events
14
Delete events
0

Modification events

(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6564) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6444Urgent payment request 【紧急付款请求.exeC:\Users\admin\AppData\Local\Temp\aut5B33.tmpbinary
MD5:0D73B37C832A9C0F8319A8911F8C180F
SHA256:DEB262D8349ECB9C897ECDE2570451A9AAE11F36A8D7CA7F9AC429FD2EC77555
6444Urgent payment request 【紧急付款请求.exeC:\Users\admin\AppData\Local\Temp\Grafftext
MD5:99CF0534828EE5601EF110EE0A7D536E
SHA256:D7AD4CEB9F0E888E5834AA660D617289D1E87CEFB25B00E037EF0787F4503C7A
6444Urgent payment request 【紧急付款请求.exeC:\Users\admin\AppData\Local\Temp\aut5C5D.tmpbinary
MD5:938531D3B513A28947615D6B707DDC13
SHA256:F6DA0147F09B05D630F2A9B886080E087E107CB08B7ACC087A224B7B976FC7AF
6444Urgent payment request 【紧急付款请求.exeC:\Users\admin\AppData\Local\Temp\molecastbinary
MD5:3FEB21CC2310483387952C6B569835A2
SHA256:65DB07A2A565BDD51A422C57658EE5A36312B6AF6FA21A4E54CD5CCC3A0F19B8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
33
DNS requests
19
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3220
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
3220
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
6564
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
3220
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3220
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
6564
RegSvcs.exe
193.122.6.168:80
checkip.dyndns.org
ORACLE-BMC-31898
DE
shared
6564
RegSvcs.exe
104.21.64.1:443
reallyfreegeoip.org
CLOUDFLARENET
malicious
5964
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.131
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.76
  • 20.190.160.66
  • 20.190.160.5
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
checkip.dyndns.org
  • 193.122.6.168
  • 158.101.44.242
  • 193.122.130.0
  • 132.226.247.73
  • 132.226.8.169
shared
reallyfreegeoip.org
  • 104.21.64.1
  • 104.21.48.1
  • 104.21.16.1
  • 104.21.32.1
  • 104.21.80.1
  • 104.21.96.1
  • 104.21.112.1
malicious
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
api.telegram.org
  • 149.154.167.220
shared
us2.smtp.mailhostbox.com
  • 208.91.199.225
  • 208.91.198.143
  • 208.91.199.223
  • 208.91.199.224
shared
arc.msn.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
6564
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6564
RegSvcs.exe
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
6564
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org)
6564
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
2192
svchost.exe
Misc activity
ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org)
6564
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6564
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6564
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
No debug info