File name:

dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6

Full analysis: https://app.any.run/tasks/97c283f1-f54d-40be-8e66-e52102aa9f74
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: January 10, 2025, 22:46:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
expiro
sinkhole
evasion
snake
keylogger
m0yv
stealer
telegram
autoit
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

5742AB086DC8F6E149625CB4AF899678

SHA1:

89680C76C0E33AC54A1932DF4BFB7AA3E2EE0746

SHA256:

DFF12E1840C3265F14378662E2DBD2E1CAD4AA31027FF29056A42964ADDA27C6

SSDEEP:

49152:DHlGAoWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZn:oAzQX21RBt7QjTmcaTH/vU4do9Pcjq1J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • M0YV mutex has been found

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Request for a sinkholed resource

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Connects to the CnC server

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • EXPIRO has been detected (SURICATA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 6332)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 6332)
    • Expiro has been found (SURICATA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 6332)
    • M0YV has been detected (YARA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
  • SUSPICIOUS

    • Executes application which crashes

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Process drops legitimate windows executable

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Executable content was dropped or overwritten

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Contacting a server suspected of hosting an CnC

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • RegSvcs.exe (PID: 6332)
    • The process verifies whether the antivirus software is installed

      • RegSvcs.exe (PID: 6332)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • RegSvcs.exe (PID: 6332)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 6332)
  • INFO

    • Creates files or folders in the user directory

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • WerFault.exe (PID: 6448)
    • Reads mouse settings

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Reads the computer name

      • RegSvcs.exe (PID: 6332)
      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • The sample compiled with english language support

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Checks proxy server information

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • RegSvcs.exe (PID: 6332)
      • WerFault.exe (PID: 6448)
    • Checks supported languages

      • RegSvcs.exe (PID: 6332)
      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Disables trace logs

      • RegSvcs.exe (PID: 6332)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 6332)
      • WerFault.exe (PID: 6448)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6332)
    • The process uses AutoIt

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:12 02:20:58+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 402944
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #EXPIRO dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe #SNAKEKEYLOGGER regsvcs.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2136"C:\Users\admin\AppData\Local\Temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe" C:\Users\admin\AppData\Local\Temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6332"C:\Users\admin\AppData\Local\Temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6448C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2136 -s 828C:\Windows\SysWOW64\WerFault.exe
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
4 450
Read events
4 436
Write events
14
Delete events
0

Modification events

(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
6
Suspicious files
9
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6448WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_dff12e1840c3265f_615952eb4a3960ba10e3ff9b49fe9aaeb741e68e_b0d4230d_ab090b0b-0cad-46c7-902b-207337483913\Report.wer
MD5:
SHA256:
6448WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgr.exeexecutable
MD5:4685F3EEBD5AA3D1D146A15CEDA74875
SHA256:37EAB1FCB0314D71250FFB4DC104C964C57A1874B0EACE6D834517C0D8795805
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeexecutable
MD5:8657BDCD0080F130BF070504532ACC13
SHA256:8418B1C7A01B80FD932D45455ECF194FCF516F1FD0F3E9439AB32787282D4ED5
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Users\admin\AppData\Roaming\26b799fa89ba8c8f.binbinary
MD5:FD653B55E25E4755AFF1E1C6CF3E6116
SHA256:0E540AE98A6B09B5685D3CE0990E0274A541B4E985F1B2FD3DE909D30ACBC93A
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Users\admin\AppData\Local\Temp\contraposebinary
MD5:56595A9D5814D52213825A99B8A10572
SHA256:7E579893373B4B03BA28248DA864E4A5210B3C84457FE6157EDBEB5EADF39D1D
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeexecutable
MD5:C01CF44EC3AFD51D915FD57CC69CFD17
SHA256:BB4D6D9C58C8AD394EAA1577187063EEDE4F36F7ECD5AB7B7BD6986B7395146F
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Users\admin\AppData\Local\Temp\aut5305.tmpbinary
MD5:A491FD8774FDEA49C4F788E056EA1A6A
SHA256:A8276CEC57284A950D43EB704D4EB0ED72350C073C83E2B21F2674DB6A127FD7
6448WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:EF5CF4D2C2AAEE3E3D3E60A86874E591
SHA256:0FE3C278D9B5D1A6D0BA2701193EC36E91025166F1EBB27FFB731C6A35BBCB17
6448WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5FA8.tmp.WERInternalMetadata.xmlxml
MD5:1AC0C0B360E1EA73720C646A753FE11A
SHA256:A2841DD06CDD4597B943EE564810B21A427CA960742436E1D1A95D0A58ED7A93
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
41
DNS requests
26
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6448
WerFault.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6448
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6332
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
POST
200
54.244.188.177:80
http://pywolwnvd.biz/khbpwdj
unknown
malicious
2436
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
POST
200
18.141.10.107:80
http://ssbzmoy.biz/q
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2736
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
54.244.188.177:80
pywolwnvd.biz
AMAZON-02
US
malicious
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
18.141.10.107:80
ssbzmoy.biz
AMAZON-02
SG
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
pywolwnvd.biz
  • 54.244.188.177
malicious
login.live.com
  • 40.126.32.134
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.74
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.72
  • 40.126.32.136
whitelisted
ssbzmoy.biz
  • 18.141.10.107
malicious
ocsp.digicert.com
  • 192.229.221.95
whitelisted
cvgrf.biz
  • 54.244.188.177
malicious

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org)
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org)
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
1 ETPRO signatures available at the full report
No debug info