analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe

Full analysis: https://app.any.run/tasks/4eeeba7a-bab8-4514-bfc0-24b1f20b53e3
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: October 09, 2019, 16:57:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
keylogger
agenttesla
rat
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

F0A33DA1B81CAD33CC68A871D03A8936

SHA1:

F9738EADB828442F38A2B24491B832B66F272806

SHA256:

0CAB2EBC2DE5DE57BC2D30A1F3CFFA533E02986D600D1408D3D35979D78F6A23

SSDEEP:

12288:qbtqrBqrwTOnK0qmMcSaDTedHMW1CnxUZpHV5iWqG/z9HpB9ua1afJo1mJxRHHEJ:qcAKZbcSaDTc56U3HT6G/RgacfJYOW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe (PID: 2664)
    • AGENTTESLA was detected

      • RegAsm.exe (PID: 2268)
    • Actions looks like stealing of personal data

      • RegAsm.exe (PID: 2268)
  • SUSPICIOUS

    • Creates files in the user directory

      • 0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe (PID: 2664)
      • RegAsm.exe (PID: 2268)
    • Reads Windows Product ID

      • RegAsm.exe (PID: 3812)
      • RegAsm.exe (PID: 2268)
    • Reads Environment values

      • RegAsm.exe (PID: 2268)
    • Reads the cookies of Mozilla Firefox

      • RegAsm.exe (PID: 2268)
    • Executable content was dropped or overwritten

      • 0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe (PID: 2664)
    • Reads the cookies of Google Chrome

      • RegAsm.exe (PID: 2268)
    • Checks for external IP

      • RegAsm.exe (PID: 2268)
    • Connects to SMTP port

      • RegAsm.exe (PID: 2268)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

ProductName: AdobbePDF
AssemblyVersion: 0.0.0.0
ProductVersion: 1.0.0.0
OriginalFileName: AdobbePDF.exe
LegalCopyright: Copyright 2018
InternalName: AdobbePDF.exe
FileVersion: 1.0.0.0
FileDescription: AdobbePD
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x12e12e
UninitializedDataSize: -
InitializedDataSize: 214016
CodeSize: 1229312
LinkerVersion: 8
PEType: PE32
TimeStamp: 2019:08:24 13:48:01+02:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe #AGENTTESLA regasm.exe regasm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2664"C:\Users\admin\AppData\Local\Temp\0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe" C:\Users\admin\AppData\Local\Temp\0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AdobbePD
Exit code:
0
Version:
1.0.0.0
2268"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.7.3062.0 built by: NET472REL1
3812"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
4294967295
Version:
4.7.3062.0 built by: NET472REL1
Total events
91
Read events
77
Write events
14
Delete events
0

Modification events

(PID) Process:(2664) 0cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:addobe
Value:
C:\Users\admin\AppData\Roaming\addobe.exe
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2268) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
1
Suspicious files
1
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2268RegAsm.exeC:\Users\admin\AppData\Roaming\k2jggn4l.u5y\Chrome\Default\Cookiessqlite
MD5:DD9640AF5F03807CF2E3921CBA16AF0D
SHA256:ECF72C454FEF08C5948A565464839A554567E499F995483D6C8B54B32EA2C5F0
26640cab2ebc2de5de57bc2d30a1f3cffa533e02986d600d1408d3d35979d78f6a23.exeC:\Users\admin\AppData\Roaming\addobe.exeexecutable
MD5:F0A33DA1B81CAD33CC68A871D03A8936
SHA256:0CAB2EBC2DE5DE57BC2D30A1F3CFFA533E02986D600D1408D3D35979D78F6A23
2268RegAsm.exeC:\Users\admin\AppData\Roaming\k2jggn4l.u5y.zipcompressed
MD5:EB19E01C22C79580F3364293B2C16F2B
SHA256:C8ED9DC4C510B955A10C052B0B952D37EF57F229814979733D9A6D60F1FBF810
2268RegAsm.exeC:\Users\admin\AppData\Roaming\k2jggn4l.u5y\Firefox\Profiles\qldyz51w.default\cookies.sqlitesqlite
MD5:7C426E0FC19063A433349CE713DA84A0
SHA256:9925B2D80F8A85132EF4927979B25E0B9525E8317A71FFD844980B794B04234C
2268RegAsm.exeC:\Users\admin\AppData\Local\Temp\637062406927506250_2ae373c3-ba0d-4ecd-aca2-48d9c8b244c7.dbsqlite
MD5:0B3C43342CE2A99318AA0FE9E531C57B
SHA256:0CCB4915E00390685621DA3D75EBFD5EDADC94155A79C66415A7F4E9763D71B8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2268
RegAsm.exe
GET
200
34.196.181.158:80
http://checkip.amazonaws.com/
US
text
16 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2268
RegAsm.exe
78.142.19.111:587
FOP Smirnov V'yacheslav Valentunovuch
BG
malicious
2268
RegAsm.exe
34.196.181.158:80
checkip.amazonaws.com
Amazon.com, Inc.
US
shared

DNS requests

Domain
IP
Reputation
checkip.amazonaws.com
  • 34.196.181.158
  • 3.224.145.145
  • 18.205.71.63
  • 18.214.132.216
  • 52.44.169.135
  • 52.55.255.113
shared

Threats

PID
Process
Class
Message
2268
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] AgentTesla IP Check
2268
RegAsm.exe
A Network Trojan was detected
AV TROJAN Win.Keylogger.AgentTesla variant outbound SMTP connection
2268
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Spy.Keylogger.AgentTesla Exfiltration by SMTP
4 ETPRO signatures available at the full report
No debug info