File name:

SecuriteInfo.com.Win32.MalwareX-gen.16056.29351

Full analysis: https://app.any.run/tasks/b7095457-32fa-4996-9d03-cff08934d58b
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: September 26, 2023, 10:41:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
evasion
snake
keylogger
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

EE3BA73A32711562903523726BA2DF7C

SHA1:

AA3927A92D75CAE9B60740AC656A7944709D139B

SHA256:

EEEF52701956CC860771EF368589E3590A1E55A172910FB7B02950A5F9A06A9E

SSDEEP:

6144:krguHQQbURQH4SAislYsk1uU9pqZ+MiHk+xujrKO7I:krguH/URQYSAisl1klu1+8XKC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • Actions looks like stealing of personal data

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • SNAKEKEYLOGGER was detected

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • SNAKE detected by memory dumps

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
  • SUSPICIOUS

    • Application launched itself

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2768)
    • Reads the Internet Settings

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • Accesses Microsoft Outlook profiles

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • Checks for external IP

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • The process verifies whether the antivirus software is installed

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • Connects to SMTP port

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
  • INFO

    • Checks supported languages

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2768)
    • Reads the computer name

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2768)
      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2768)
      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
    • Reads Environment values

      • SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe (PID: 2440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(2440) SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
Keys
DES6fc98cd6
Options
SMTP Passwordnilya1957
SMTP Hostposta.ni.net.tr
SMTP Port587
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

AssemblyVersion: 1.0.0.0
ProductVersion: 1.0.0.0
ProductName: KioskApp
OriginalFileName: KioskApp.exe
LegalTrademarks: -
LegalCopyright: Copyright © 2022
InternalName: KioskApp.exe
FileVersion: 1.0.0.0
FileDescription: KioskApp
CompanyName: -
Comments: -
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x5163e
UninitializedDataSize: -
InitializedDataSize: 2048
CodeSize: 325632
LinkerVersion: 48
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2042:08:07 12:42:23+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.win32.malwarex-gen.16056.29351.exe no specs #SNAKE securiteinfo.com.win32.malwarex-gen.16056.29351.exe

Process information

PID
CMD
Path
Indicators
Parent process
2440"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
User:
admin
Integrity Level:
MEDIUM
Description:
KioskApp
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malwarex-gen.16056.29351.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\syswow64\mscoree.dll
c:\windows\system32\user32.dll
SnakeKeylogger
(PID) Process(2440) SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
Keys
DES6fc98cd6
Options
SMTP Passwordnilya1957
SMTP Hostposta.ni.net.tr
SMTP Port587
2768"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
KioskApp
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malwarex-gen.16056.29351.exe
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
671
Read events
671
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
2
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2440
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
GET
200
132.226.247.73:80
http://checkip.dyndns.org/
unknown
html
107 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
1208
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
unknown
2440
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
132.226.247.73:80
checkip.dyndns.org
ORACLE-BMC-31898
BR
unknown
332
svchost.exe
224.0.0.252:5355
unknown
2440
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
89.252.128.115:587
posta.ni.net.tr
Netinternet Bilisim Teknolojileri AS
TR
unknown

DNS requests

Domain
IP
Reputation
checkip.dyndns.org
  • 132.226.247.73
  • 158.101.44.242
  • 193.122.130.0
  • 193.122.6.168
  • 132.226.8.169
unknown
posta.ni.net.tr
  • 89.252.128.115
unknown

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org)
Misc activity
AV INFO Query to checkip.dyndns. Domain
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
A Network Trojan was detected
ET MALWARE Snake Keylogger Exfil via SMTP
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Base64 encoded Password Exfiltration Atempt (shifted+1)
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Base64 encoded Login Exfiltration Atempt (shifted+1)
No debug info