File name: | 1f3301fbf6c59e606f4b51b9ed300984315d19398803304a89089cdb3610c414.xlsx |
Full analysis: | https://app.any.run/tasks/fcad3ef8-413c-4ec8-844b-ae4717e9f6c4 |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | September 19, 2019, 09:14:28 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/CDFV2 |
File info: | Composite Document File V2 Document, Cannot read section info |
MD5: | A48691159A786CA019FE9A0B7714A0F9 |
SHA1: | AFE3C23112F35766FCDAF8172C0E27FFBE12B9D1 |
SHA256: | 1F3301FBF6C59E606F4B51B9ED300984315D19398803304A89089CDB3610C414 |
SSDEEP: | 12288:IY2Q8ui1w4N0B/mhJLtsdcdnW7YZiiNUOUzIGkGD5RZk2C0M:IY2dN9+mbLtsOP09OUdTDW |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2884 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Version: 14.0.6024.1000 | ||||
2948 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 | ||||
2836 | "C:\Users\Public\vbc.exe" | C:\Users\Public\vbc.exe | — | EQNEDT32.EXE |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3152 | "C:\Windows\System32\eventvwr.exe" | C:\Windows\System32\eventvwr.exe | — | vbc.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Event Viewer Snapin Launcher Exit code: 3221226540 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2456 | "C:\Windows\System32\eventvwr.exe" | C:\Windows\System32\eventvwr.exe | vbc.exe | |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Event Viewer Snapin Launcher Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3448 | "C:\Users\Public\vbc.exe" | C:\Users\Public\vbc.exe | eventvwr.exe | |
User: admin Integrity Level: HIGH | ||||
2864 | "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | vbc.exe | |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft .NET Assembly Registration Utility Version: 2.0.50727.5420 (Win7SP1.050727-5400) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2884 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR9D1F.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2864 | RegAsm.exe | C:\Users\admin\AppData\Roaming\zimoitrr.2yp\Chrome\Default\Cookies | — | |
MD5:— | SHA256:— | |||
2864 | RegAsm.exe | C:\Users\admin\AppData\Roaming\zimoitrr.2yp\Firefox\Profiles\qldyz51w.default\cookies.sqlite | — | |
MD5:— | SHA256:— | |||
2864 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\637044849127358750_09910665-d27e-448b-9889-ed4e0ca9cbe8.db | sqlite | |
MD5:0B3C43342CE2A99318AA0FE9E531C57B | SHA256:0CCB4915E00390685621DA3D75EBFD5EDADC94155A79C66415A7F4E9763D71B8 | |||
2864 | RegAsm.exe | C:\Users\admin\AppData\Roaming\zimoitrr.2yp.zip | compressed | |
MD5:C4CBABC691CF22D33DBD1ECE8A42B651 | SHA256:D6FDDBDB153BF43E84B968B0732BFFBC0C5907ED99E075A125C87A9336A81848 | |||
2948 | EQNEDT32.EXE | C:\Users\Public\vbc.exe | executable | |
MD5:CA065F6808C0B626CF12C35BB1A3785C | SHA256:BB240C7E24477BCBB3B73C9EC3E7B60254F1DBBD9A833FA3914E20BC4049431E | |||
2948 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\al................[1].exe | executable | |
MD5:CA065F6808C0B626CF12C35BB1A3785C | SHA256:BB240C7E24477BCBB3B73C9EC3E7B60254F1DBBD9A833FA3914E20BC4049431E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2948 | EQNEDT32.EXE | GET | 200 | 23.249.165.218:80 | http://workbigfinetonychuckgoodallarefinezynovaexploitgood.warzonedns.com/aluko...........................................a/al.................exe | US | executable | 1.43 Mb | malicious |
2864 | RegAsm.exe | GET | 200 | 3.224.145.145:80 | http://checkip.amazonaws.com/ | US | text | 14 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2948 | EQNEDT32.EXE | 23.249.165.218:80 | workbigfinetonychuckgoodallarefinezynovaexploitgood.warzonedns.com | ColoCrossing | US | malicious |
2864 | RegAsm.exe | 208.91.199.223:587 | us2.smtp.mailhostbox.com | PDR | US | shared |
2864 | RegAsm.exe | 3.224.145.145:80 | checkip.amazonaws.com | — | US | shared |
Domain | IP | Reputation |
---|---|---|
workbigfinetonychuckgoodallarefinezynovaexploitgood.warzonedns.com |
| malicious |
checkip.amazonaws.com |
| shared |
us2.smtp.mailhostbox.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
2948 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2864 | RegAsm.exe | A Network Trojan was detected | MALWARE [PTsecurity] AgentTesla IP Check |
2864 | RegAsm.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
2864 | RegAsm.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |