File name:

Trojan-PSW.MSIL.AgentTesla.exe.vir

Full analysis: https://app.any.run/tasks/f5a1d025-461a-4bc6-9943-c698ebfe2930
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: March 05, 2024, 22:05:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
agenttesla
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

41A05027AE1ABC87471806912D541084

SHA1:

498DBB5CA1454C9D24417EC753F6B4D19DF43D37

SHA256:

0A7ED7874B472F88B5D20A911C35BA4EB3C973AD384920485EA360ADE4BCFACA

SSDEEP:

1536:3PTXA0+GZB1mBSGpt+t9OUyKlkfNnjeTEYjiQHgFKm4yUAxkxHc76w8lKfaXPA3L:fTXO5W6PAHbXI4Q5XMVdMJy9jHu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Steals credentials from Web Browsers

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • AGENTTESLA has been detected (YARA)

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Actions looks like stealing of personal data

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Accesses Microsoft Outlook profiles

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Reads settings of System Certificates

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Checks for external IP

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Connects to SMTP port

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
  • INFO

    • Reads the computer name

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Reads Environment values

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Checks supported languages

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Reads the machine GUID from the registry

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Create files in a temporary directory

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
    • Reads the software policy settings

      • Trojan-PSW.MSIL.AgentTesla.exe.vir.exe (PID: 3864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
Protocolsmtp
Host3dlens.net
Port587
Usernameplumbsend@3dlens.net
PasswordBukky101@
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:02:05 07:26:23+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 242688
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x3d32e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: e3abdeef-9055-4257-bc51-041a7c1b0227.exe
LegalCopyright:
OriginalFileName: e3abdeef-9055-4257-bc51-041a7c1b0227.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #AGENTTESLA trojan-psw.msil.agenttesla.exe.vir.exe

Process information

PID
CMD
Path
Indicators
Parent process
3864"C:\Users\admin\AppData\Local\Temp\Trojan-PSW.MSIL.AgentTesla.exe.vir.exe" C:\Users\admin\AppData\Local\Temp\Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\trojan-psw.msil.agenttesla.exe.vir.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
AgentTesla
(PID) Process(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
Protocolsmtp
Host3dlens.net
Port587
Usernameplumbsend@3dlens.net
PasswordBukky101@
Total events
5 971
Read events
5 945
Write events
26
Delete events
0

Modification events

(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASMANCS
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3864) Trojan-PSW.MSIL.AgentTesla.exe.vir.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Trojan-PSW_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
Executable files
0
Suspicious files
3
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3864Trojan-PSW.MSIL.AgentTesla.exe.vir.exeC:\Users\admin\AppData\Local\Temp\Tar464C.tmpcat
MD5:DD73CEAD4B93366CF3465C8CD32E2796
SHA256:A6752B7851B591550E4625B832A393AABCC428DE18D83E8593CD540F7D7CAE22
3864Trojan-PSW.MSIL.AgentTesla.exe.vir.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3864Trojan-PSW.MSIL.AgentTesla.exe.vir.exeC:\Users\admin\AppData\Local\Temp\Cab464B.tmpcompressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3864Trojan-PSW.MSIL.AgentTesla.exe.vir.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:37C524104A940865DFE0136E35B3BC08
SHA256:9282D8F3C84E1EF3C5308BFD5F59533C0CC760760F50989B8CE0861F97ED0E5E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
8
DNS requests
3
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
text
6 b
unknown
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
GET
200
2.19.11.178:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7d3299ac46a94609
unknown
compressed
67.5 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
104.247.165.83:587
3dlens.net
TR
unknown
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
2.19.11.178:80
ctldl.windowsupdate.com
Elisa Oyj
NL
unknown

DNS requests

Domain
IP
Reputation
ip-api.com
  • 208.95.112.1
shared
3dlens.net
  • 104.247.165.83
malicious
ctldl.windowsupdate.com
  • 2.19.11.178
  • 2.19.11.136
  • 2.19.11.155
whitelisted

Threats

PID
Process
Class
Message
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
3864
Trojan-PSW.MSIL.AgentTesla.exe.vir.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
No debug info