File name:

akl.exe

Full analysis: https://app.any.run/tasks/cefb63ba-bf0a-4ad4-b276-0958112a0dd5
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: July 04, 2023, 10:36:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
keylogger
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

7D71AE9DCD7015877818789044F83C0D

SHA1:

9A0C177EAB78FFB1619FFAD8B83EA1915B03CC57

SHA256:

D91CFC9652F62F91DD1B3800354DA03F76B3E80508D8550121615D2323653851

SSDEEP:

24576:DyYuQ7CZG24DsO7Hdrkax250RhWPLlfhkyQGshzcqNH:+YuQUG379oULhWPBHXMceH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • UAC/LUA settings modification

      • akl.exe (PID: 3436)
    • Application was injected by another process

      • dllhost.exe (PID: 1156)
      • explorer.exe (PID: 1068)
      • taskeng.exe (PID: 300)
      • dwm.exe (PID: 488)
      • ctfmon.exe (PID: 1612)
    • Changes firewall settings

      • akl.exe (PID: 3436)
    • Changes appearance of the Explorer extensions

      • akl.exe (PID: 3436)
    • Runs injected code in another process

      • akl.exe (PID: 3436)
    • Changes Security Center notification settings

      • akl.exe (PID: 3436)
    • Application was dropped or rewritten from another process

      • GEM.exe (PID: 2820)
    • Changes the autorun value in the registry

      • GEM.exe (PID: 2820)
    • Loads dropped or rewritten executable

      • GEM.exe (PID: 2820)
      • iexplore.exe (PID: 2936)
      • dwm.exe (PID: 488)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • akl.exe (PID: 3436)
      • dwm.exe (PID: 488)
    • Writes files like Keylogger logs

      • akl.exe (PID: 3436)
    • Reads the Internet Settings

      • akl.exe (PID: 3436)
      • explorer.exe (PID: 1068)
    • Creates a software uninstall entry

      • GEM.exe (PID: 2820)
  • INFO

    • Checks supported languages

      • akl.exe (PID: 3436)
      • GEM.exe (PID: 2820)
    • The process checks LSA protection

      • akl.exe (PID: 3436)
      • GEM.exe (PID: 2820)
      • dwm.exe (PID: 488)
    • Reads the computer name

      • akl.exe (PID: 3436)
      • GEM.exe (PID: 2820)
    • Create files in a temporary directory

      • akl.exe (PID: 3436)
    • Reads Environment values

      • akl.exe (PID: 3436)
    • Creates files in the program directory

      • akl.exe (PID: 3436)
      • GEM.exe (PID: 2820)
    • Changes appearance of the Explorer extensions

      • dwm.exe (PID: 488)
    • Application launched itself

      • iexplore.exe (PID: 2936)
    • Manual execution by a user

      • notepad.exe (PID: 3400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (91.9)
.exe | Win32 Executable MS Visual C++ (generic) (3.3)
.exe | Win64 Executable (generic) (3)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.4)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x3225
UninitializedDataSize: 1024
InitializedDataSize: 119808
CodeSize: 23040
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2008:05:03 14:08:42+00:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 03-May-2008 14:08:42
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 03-May-2008 14:08:42
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005934
0x00005A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.48203
.rdata
0x00007000
0x00001190
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.17797
.data
0x00009000
0x0001AF98
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.7025
.ndata
0x00024000
0x00009000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0002D000
0x00015000
0x00014800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.89573

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.11218
533
UNKNOWN
English - United States
RT_MANIFEST
2
3.07709
296
UNKNOWN
English - United States
RT_ICON
102
2.71813
180
UNKNOWN
English - United States
RT_DIALOG
103
1.97134
34
UNKNOWN
English - United States
RT_GROUP_ICON
104
2.70411
344
UNKNOWN
English - United States
RT_DIALOG
105
2.68372
512
UNKNOWN
English - United States
RT_DIALOG
106
2.91148
248
UNKNOWN
English - United States
RT_DIALOG
107
2.52183
160
UNKNOWN
English - United States
RT_DIALOG
110
2.82633
1638
UNKNOWN
English - United States
RT_BITMAP
111
2.92787
238
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
inject inject inject inject drop and start start akl.exe taskeng.exe dwm.exe explorer.exe dllhost.exe ctfmon.exe gem.exe iexplore.exe no specs iexplore.exe no specs akv.exe no specs notepad.exe no specs akl.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300taskeng.exe {7B96D6FA-56F8-4CBB-8B05-318563A2BC2C}C:\Windows\System32\taskeng.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Engine
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskeng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
488"C:\Windows\system32\Dwm.exe"C:\Windows\System32\dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\uxtheme.dll
1068C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1156C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}C:\Windows\System32\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1612C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2820"C:\Program Files\GEM\GEM.exe"C:\Program Files\GEM\GEM.exe
akl.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\gem\gem.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
2936"C:\Program Files\Internet Explorer\iexplore.exe" C:\Program Files\GEM\qs.htmlC:\Program Files\Internet Explorer\iexplore.exeakl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
3400"C:\Windows\system32\notepad.exe" C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3436"C:\Users\admin\Desktop\akl.exe" C:\Users\admin\Desktop\akl.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\akl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3488"C:\Program Files\GEM\AKV.exe" C:\Program Files\GEMC:\Program Files\GEM\AKV.exeGEM.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Total events
4 797
Read events
4 705
Write events
90
Delete events
2

Modification events

(PID) Process:(1068) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(3436) akl.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Operation:writeName:Hidden
Value:
1
(PID) Process:(3436) akl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
1
(PID) Process:(3436) akl.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
Operation:writeName:EnableFirewall
Value:
0
(PID) Process:(3436) akl.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
Operation:writeName:DisableNotifications
Value:
0
(PID) Process:(1068) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(3436) akl.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Operation:writeName:Hidden
Value:
2
(PID) Process:(3436) akl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:AntiVirusOverride
Value:
1
(PID) Process:(3436) akl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:AntiVirusDisableNotify
Value:
1
(PID) Process:(3436) akl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:FirewallDisableNotify
Value:
1
Executable files
13
Suspicious files
16
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3436akl.exeC:\Users\admin\AppData\Local\Temp\nsiC9E6.tmp\modern-header.bmpimage
MD5:173391C2C5228607D99CA65F29C8FB3E
SHA256:6F178942B4130DD4C59215F1CE59CD47226F1AC4149F481486E9A652EA9CD1D8
3436akl.exeC:\Windows\SYSTEM.INIbinary
MD5:2920C2855A3D74FD9BA27D764415B694
SHA256:07B844149BC204295235B6A8182E0C02D09D51BAE8B2EBA132F2125C273951B0
3436akl.exeC:\Users\admin\AppData\Local\Temp\0011BA35_Rar\akl.exeexecutable
MD5:7D71AE9DCD7015877818789044F83C0D
SHA256:D91CFC9652F62F91DD1B3800354DA03F76B3E80508D8550121615D2323653851
3436akl.exeC:\Program Files\GEM\GEM.exeexecutable
MD5:A7B322839CEDF8D56CB0A7DCDB50AB59
SHA256:BA7362315C0608C9203C9D607FD85695FBC15F034EA40B3DE7DD1ABEBD5859A3
3436akl.exeC:\Program Files\GEM\GEM.003executable
MD5:CB07753C45624238B4403480372BE5DB
SHA256:63C3ED8CBE11314A2F2CD6FF50305BAD98075BE9E09D22E45B47AF557A3388E7
3436akl.exeC:\Program Files\GEM\GEM.006executable
MD5:3DA3041787B72A7909D9F6184CE6BC5E
SHA256:18E06896CC71E99B717CFF8D68CBA86FEA3EBA5087B93734F6418E53CADAB5B3
3436akl.exeC:\Program Files\GEM\GEM.004executable
MD5:55B44502952B9FFEEC6BEF6A132B1791
SHA256:8776541720652554C626410FB17FFDD24DDD762632C6C5D2FC77AC5ADF9432DC
3436akl.exeC:\Program Files\GEM\GEM.007executable
MD5:50D0BCF6B5A6B11D9E274CCEFBA3F02E
SHA256:A5E5CF8B3133031F25DB37FD13B029CDFC9D1588CA7F68041E52349F46CBBF5C
3436akl.exeC:\Users\admin\AppData\Local\Temp\nsiC9E6.tmp\ioSpecial.initext
MD5:E2D5070BC28DB1AC745613689FF86067
SHA256:D95AED234F932A1C48A2B1B0D98C60CA31F962310C03158E2884AB4DDD3EA1E0
3436akl.exeC:\Users\admin\AppData\Local\Temp\winbihvt.exeexecutable
MD5:25AA9BB549ECC7BB6100F8D179452508
SHA256:DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
19
DNS requests
8
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
2692
svchost.exe
239.255.255.250:1900
whitelisted
184.86.251.12:443
www.bing.com
Akamai International B.V.
DE
suspicious
184.86.251.14:443
www.bing.com
Akamai International B.V.
DE
suspicious
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted
204.79.197.200:443
ieonline.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
184.86.251.7:443
www.bing.com
Akamai International B.V.
DE
suspicious
184.86.251.9:443
www.bing.com
Akamai International B.V.
DE
suspicious

DNS requests

Domain
IP
Reputation
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 184.86.251.12
  • 184.86.251.14
  • 184.86.251.9
  • 184.86.251.7
  • 184.86.251.24
  • 184.86.251.4
  • 184.86.251.20
  • 184.86.251.22
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

No threats detected
No debug info