analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

payment advice.exe

Full analysis: https://app.any.run/tasks/bbf67d9f-b6a9-4c82-a0c6-4cb3f04674d2
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: October 05, 2022, 07:13:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
snake
evasion
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

2C4CE1A8EAABB150842428FAD62D3AA5

SHA1:

3B363403E579459A7954C4564C950041327C755C

SHA256:

85F7F26CD9CFB9AB367D083F60B48E1594B1EADF8DD1A792C347273684855013

SSDEEP:

12288:fWmfDfxt7J0iJKfJDbV5wPw2a7iLv1/L5le289QgM8B:72RfJW1Ciblvng

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SNAKE detected by memory dumps

      • RegSvcs.exe (PID: 1952)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 1952)
  • SUSPICIOUS

    • Reads the machine GUID from the registry

      • payment advice.exe (PID: 3440)
      • RegSvcs.exe (PID: 1952)
    • Reads Internet Settings

      • payment advice.exe (PID: 3440)
      • RegSvcs.exe (PID: 1952)
    • Loads DLL from Mozilla Firefox

      • RegSvcs.exe (PID: 1952)
    • Checks for external IP

      • RegSvcs.exe (PID: 1952)
  • INFO

    • Checks supported languages

      • payment advice.exe (PID: 3440)
      • RegSvcs.exe (PID: 1952)
    • Reads the computer name

      • payment advice.exe (PID: 3440)
      • RegSvcs.exe (PID: 1952)
    • Process checks LSA protection

      • payment advice.exe (PID: 3440)
      • RegSvcs.exe (PID: 1952)
    • Reads Environment values

      • RegSvcs.exe (PID: 1952)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 1952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(1952) RegSvcs.exe
Credentials
Passwordeurobit555ro
Port587
Hostmail.stilltech.ro
ProtocolSMTP
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (49)
.exe | Win32 Executable MS Visual C++ (generic) (20.9)
.exe | Win64 Executable (generic) (18.5)
.dll | Win32 Dynamic Link Library (generic) (4.4)
.exe | Win32 Executable (generic) (3)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-May-10 01:06:57
Debug artifacts:
  • C:\Users\Administrator\Desktop\Client\Temp\hDfjaWdXku\src\obj\Debug\StaticArrayInitTypeSize1.pdb
Comments: -
CompanyName: BASeCamp Software Solutions
FileDescription: JobClock Administration Applet
FileVersion: 1.4.8.0
InternalName: StaticArrayInitTypeSize1.exe
LegalCopyright: Copyright © 2011 BASeCamp Software Solutions
LegalTrademarks: -
OriginalFilename: StaticArrayInitTypeSize1.exe
ProductName: BASeCamp JobClock
ProductVersion: 1.4.8.0
Assembly Version: 1.4.8.0

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 128

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 3
TimeDateStamp: 2022-May-10 01:06:57
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
8192
759656
759808
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.18396
.rsrc
770048
87852
88064
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.00494
.reloc
860160
12
1024
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.0558553

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.12237
2216
UNKNOWN
UNKNOWN
RT_ICON
2
3.07433
1384
UNKNOWN
UNKNOWN
RT_ICON
3
3.86907
67624
UNKNOWN
UNKNOWN
RT_ICON
4
3.91225
9640
UNKNOWN
UNKNOWN
RT_ICON
5
4.02796
4264
UNKNOWN
UNKNOWN
RT_ICON
6
4.40531
1128
UNKNOWN
UNKNOWN
RT_ICON
32512
2.75822
90
UNKNOWN
UNKNOWN
RT_GROUP_ICON
1 (#2)
3.3908
1028
UNKNOWN
UNKNOWN
RT_VERSION

Imports

mscoree.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start payment advice.exe no specs #SNAKE regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
3440"C:\Users\admin\AppData\Local\Temp\payment advice.exe" C:\Users\admin\AppData\Local\Temp\payment advice.exeExplorer.EXE
User:
admin
Company:
BASeCamp Software Solutions
Integrity Level:
MEDIUM
Description:
JobClock Administration Applet
Exit code:
0
Version:
1.4.8.0
1952"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
payment advice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.0.30319.34209 built by: FX452RTMGDR
SnakeKeylogger
(PID) Process(1952) RegSvcs.exe
Credentials
Passwordeurobit555ro
Port587
Hostmail.stilltech.ro
ProtocolSMTP
Total events
813
Read events
793
Write events
20
Delete events
0

Modification events

(PID) Process:(3440) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3440) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3440) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3440) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1952) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1952) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1952) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1952) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1952) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1952) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1952
RegSvcs.exe
GET
200
132.226.247.73:80
http://checkip.dyndns.org/
US
html
105 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1952
RegSvcs.exe
132.226.247.73:80
checkip.dyndns.org
ORACLE-BMC-31898
BR
malicious
1952
RegSvcs.exe
192.185.100.146:587
mail.stilltech.ro
UNIFIEDLAYER-AS-1
US
malicious

DNS requests

Domain
IP
Reputation
checkip.dyndns.org
  • 132.226.247.73
  • 193.122.130.0
  • 193.122.6.168
  • 132.226.8.169
  • 158.101.44.242
shared
mail.stilltech.ro
  • 192.185.100.146
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
Misc activity
AV INFO Query to checkip.dyndns. Domain
1952
RegSvcs.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup - checkip.dyndns.org
1952
RegSvcs.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
1 ETPRO signatures available at the full report
No debug info