File name:

dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6

Full analysis: https://app.any.run/tasks/97c283f1-f54d-40be-8e66-e52102aa9f74
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: January 10, 2025, 22:46:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
expiro
sinkhole
evasion
snake
keylogger
m0yv
stealer
telegram
autoit
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

5742AB086DC8F6E149625CB4AF899678

SHA1:

89680C76C0E33AC54A1932DF4BFB7AA3E2EE0746

SHA256:

DFF12E1840C3265F14378662E2DBD2E1CAD4AA31027FF29056A42964ADDA27C6

SSDEEP:

49152:DHlGAoWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZn:oAzQX21RBt7QjTmcaTH/vU4do9Pcjq1J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • M0YV mutex has been found

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 6332)
    • EXPIRO has been detected (SURICATA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Expiro has been found (SURICATA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Request for a sinkholed resource

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 6332)
    • Connects to the CnC server

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 6332)
    • M0YV has been detected (YARA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Executes application which crashes

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Process drops legitimate windows executable

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Contacting a server suspected of hosting an CnC

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • RegSvcs.exe (PID: 6332)
    • The process verifies whether the antivirus software is installed

      • RegSvcs.exe (PID: 6332)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 6332)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • RegSvcs.exe (PID: 6332)
  • INFO

    • Creates files or folders in the user directory

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • WerFault.exe (PID: 6448)
    • The sample compiled with english language support

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Reads mouse settings

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
    • Checks supported languages

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • RegSvcs.exe (PID: 6332)
    • Reads the computer name

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • RegSvcs.exe (PID: 6332)
    • Disables trace logs

      • RegSvcs.exe (PID: 6332)
    • Checks proxy server information

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
      • RegSvcs.exe (PID: 6332)
      • WerFault.exe (PID: 6448)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6332)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 6332)
      • WerFault.exe (PID: 6448)
    • The process uses AutoIt

      • dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe (PID: 2136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

CharacterSet: Unicode
LanguageCode: English (British)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x27dcd
UninitializedDataSize: -
InitializedDataSize: 402944
CodeSize: 581120
LinkerVersion: 12
PEType: PE32
ImageFileCharacteristics: Executable, Large address aware, 32-bit
TimeStamp: 2024:12:12 02:20:58+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #EXPIRO dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe #SNAKEKEYLOGGER regsvcs.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2136"C:\Users\admin\AppData\Local\Temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe" C:\Users\admin\AppData\Local\Temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6332"C:\Users\admin\AppData\Local\Temp\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6448C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2136 -s 828C:\Windows\SysWOW64\WerFault.exe
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
4 450
Read events
4 436
Write events
14
Delete events
0

Modification events

(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6332) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
6
Suspicious files
9
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6448WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_dff12e1840c3265f_615952eb4a3960ba10e3ff9b49fe9aaeb741e68e_b0d4230d_ab090b0b-0cad-46c7-902b-207337483913\Report.wer
MD5:
SHA256:
6448WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5E11.tmp.dmpbinary
MD5:56E5C7280AA3E137EF7A41A4AC171A2E
SHA256:6C9C8407A098FD01699252E2B359E0315B79DB4D58F1B0BCDAED37643FF99EFA
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeexecutable
MD5:8FC0EDD071DA0FB7E38F1D202DF033F2
SHA256:4CF3F0DB5E09EBBCF26899E2899DA134F152C5F46D82CF5E28DAC329CE1B6E98
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeexecutable
MD5:8657BDCD0080F130BF070504532ACC13
SHA256:8418B1C7A01B80FD932D45455ECF194FCF516F1FD0F3E9439AB32787282D4ED5
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeexecutable
MD5:C01CF44EC3AFD51D915FD57CC69CFD17
SHA256:BB4D6D9C58C8AD394EAA1577187063EEDE4F36F7ECD5AB7B7BD6986B7395146F
6448WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5FE8.tmp.xmlxml
MD5:2051EA27D8DB6532F171F0233D4562E5
SHA256:5BFF5562ED81449F8F44622E26050A6A76D2C9CBA7878A4D23689C4ACB0F70E6
6448WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe.2136.dmpbinary
MD5:F2DF0597479633FEE4113D1AA6DDE513
SHA256:A7B0B526BBF5C284EE2AC088D4F0E1F4F827E453E58C5F33EA2B50F393E4DFCB
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Users\admin\AppData\Local\Temp\aut5305.tmpbinary
MD5:A491FD8774FDEA49C4F788E056EA1A6A
SHA256:A8276CEC57284A950D43EB704D4EB0ED72350C073C83E2B21F2674DB6A127FD7
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Users\admin\AppData\Local\Temp\contraposebinary
MD5:56595A9D5814D52213825A99B8A10572
SHA256:7E579893373B4B03BA28248DA864E4A5210B3C84457FE6157EDBEB5EADF39D1D
2136dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exeexecutable
MD5:04334FCF288D9078A3BA54E0B16F15D3
SHA256:0F413AC462AD68386C64BDF37EABFCA123E7AD02EB968E6F97765D7CB9F36352
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
41
DNS requests
26
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
POST
200
54.244.188.177:80
http://pywolwnvd.biz/khbpwdj
unknown
malicious
6448
WerFault.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6448
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
POST
54.244.188.177:80
http://cvgrf.biz/crppektchvppmifs
unknown
malicious
6332
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
6332
RegSvcs.exe
GET
200
193.122.6.168:80
http://checkip.dyndns.org/
unknown
malicious
2436
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2736
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
54.244.188.177:80
pywolwnvd.biz
AMAZON-02
US
malicious
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2136
dff12e1840c3265f14378662e2dbd2e1cad4aa31027ff29056a42964adda27c6.exe
18.141.10.107:80
ssbzmoy.biz
AMAZON-02
SG
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
pywolwnvd.biz
  • 54.244.188.177
malicious
login.live.com
  • 40.126.32.134
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.74
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.72
  • 40.126.32.136
whitelisted
ssbzmoy.biz
  • 18.141.10.107
malicious
ocsp.digicert.com
  • 192.229.221.95
whitelisted
cvgrf.biz
  • 54.244.188.177
malicious

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org)
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org)
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
1 ETPRO signatures available at the full report
No debug info