File name:

payment advice.exe

Full analysis: https://app.any.run/tasks/ebf09a9a-860e-426e-aa0d-d14567877ba2
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: October 28, 2025, 23:39:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
snake
keylogger
evasion
smtp
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

2C4CE1A8EAABB150842428FAD62D3AA5

SHA1:

3B363403E579459A7954C4564C950041327C755C

SHA256:

85F7F26CD9CFB9AB367D083F60B48E1594B1EADF8DD1A792C347273684855013

SSDEEP:

12288:fWmfDfxt7J0iJKfJDbV5wPw2a7iLv1/L5le289QgM8B0:72RfJW1Ciblvng8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 932)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 932)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 932)
    • SNAKE has been detected (YARA)

      • RegSvcs.exe (PID: 932)
  • SUSPICIOUS

    • Reads the Internet Settings

      • payment advice.exe (PID: 3020)
      • RegSvcs.exe (PID: 932)
    • Reads security settings of Internet Explorer

      • payment advice.exe (PID: 3020)
    • Accesses Microsoft Outlook profiles

      • RegSvcs.exe (PID: 932)
    • Loads DLL from Mozilla Firefox

      • RegSvcs.exe (PID: 932)
    • Checks for external IP

      • RegSvcs.exe (PID: 932)
    • Connects to SMTP port

      • RegSvcs.exe (PID: 932)
  • INFO

    • Reads the computer name

      • payment advice.exe (PID: 3020)
      • RegSvcs.exe (PID: 932)
    • Reads the machine GUID from the registry

      • payment advice.exe (PID: 3020)
      • RegSvcs.exe (PID: 932)
    • Checks supported languages

      • RegSvcs.exe (PID: 932)
      • payment advice.exe (PID: 3020)
    • Disables trace logs

      • RegSvcs.exe (PID: 932)
    • Reads Environment values

      • RegSvcs.exe (PID: 932)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(932) RegSvcs.exe
Hosts (1)mail.stilltech.ro
Ports (1)587
ProtocolSMTP
Credentials
Usernameoffice@stilltech.ro
Passwordeurobit555ro
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (49)
.exe | Win32 Executable MS Visual C++ (generic) (20.9)
.exe | Win64 Executable (generic) (18.5)
.dll | Win32 Dynamic Link Library (generic) (4.4)
.exe | Win32 Executable (generic) (3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:10 01:06:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 759808
InitializedDataSize: 89088
UninitializedDataSize: -
EntryPoint: 0xbb75a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.8.0
ProductVersionNumber: 1.4.8.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: BASeCamp Software Solutions
FileDescription: JobClock Administration Applet
FileVersion: 1.4.8.0
InternalName: StaticArrayInitTypeSize1.exe
LegalCopyright: Copyright © 2011 BASeCamp Software Solutions
LegalTrademarks: -
OriginalFileName: StaticArrayInitTypeSize1.exe
ProductName: BASeCamp JobClock
ProductVersion: 1.4.8.0
AssemblyVersion: 1.4.8.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start payment advice.exe no specs regsvcs.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
932"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exepayment advice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
SnakeKeylogger
(PID) Process(932) RegSvcs.exe
Hosts (1)mail.stilltech.ro
Ports (1)587
ProtocolSMTP
Credentials
Usernameoffice@stilltech.ro
Passwordeurobit555ro
3020"C:\Users\admin\AppData\Local\Temp\payment advice.exe" C:\Users\admin\AppData\Local\Temp\payment advice.exeexplorer.exe
User:
admin
Company:
BASeCamp Software Solutions
Integrity Level:
MEDIUM
Description:
JobClock Administration Applet
Version:
1.4.8.0
Modules
Images
c:\users\admin\appdata\local\temp\payment advice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 369
Read events
1 349
Write events
20
Delete events
0

Modification events

(PID) Process:(3020) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3020) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3020) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3020) payment advice.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(932) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(932) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(932) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(932) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(932) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(932) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
8
DNS requests
3
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
932
RegSvcs.exe
GET
200
193.122.130.0:80
http://checkip.dyndns.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1076
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
932
RegSvcs.exe
193.122.130.0:80
checkip.dyndns.org
ORACLE-BMC-31898
US
whitelisted
932
RegSvcs.exe
192.185.100.146:587
mail.stilltech.ro
UNIFIEDLAYER-AS-1
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
checkip.dyndns.org
  • 193.122.130.0
  • 132.226.247.73
  • 158.101.44.242
  • 132.226.8.169
  • 193.122.6.168
whitelisted
mail.stilltech.ro
  • 192.185.100.146
malicious

Threats

PID
Process
Class
Message
1076
svchost.exe
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
932
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
932
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
932
RegSvcs.exe
Generic Protocol Command Decode
SURICATA SMTP invalid reply
932
RegSvcs.exe
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
No debug info