| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/44fb1274-4e92-4c93-9cf2-4efe84f0c5a8 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | August 22, 2024, 21:27:38 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 4 | System | [System Process] | |||||||||||||
User: SYSTEM Integrity Level: SYSTEM | |||||||||||||||
| 460 | "C:\Users\admin\Desktop\Files\a.exe" | C:\Users\admin\Desktop\Files\a.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1048 | "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE" | C:\Windows\SysWOW64\cmd.exe | — | sysarddrvs.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | "C:\Users\admin\Desktop\Files\Survox.exe" | C:\Users\admin\Desktop\Files\Survox.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
Nanocore(PID) Process(1076) Survox.exe KeyboardLoggingTrue BuildTime2024-08-16 18:00:35.335880 Version1.2.2.0 Mutexd9a2690c-d972-4399-8b23-c0fc8e2ac7c3 DefaultGroupDefault PrimaryConnectionHostvowquybcw.org BackupConnectionHost127.0.0.1 ConnectionPort34587 RunOnStartupTrue RequestElevationFalse BypassUserAccountControlFalse ClearZoneIdentifierTrue ClearAccessControlTrue SetCriticalProcessFalse PreventSystemSleepTrue ActivateAwayModeTrue EnableDebugModeFalse RunDelay0 ConnectDelay3985 RestartDelay5000 TimeoutInterval5000 KeepAliveTimeout30000 MutexTimeout5000 LanTimeout2500 WanTimeout8000 BufferSize65535 MaxPacketSize10485760 GCThreshold10485760 UseCustomDnsServerTrue PrimaryDnsServer8.8.8.8 BackupDnsServer8.8.4.4 | |||||||||||||||
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3292 | "C:\Users\admin\Desktop\Files\s.exe" | C:\Users\admin\Desktop\Files\s.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3384 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4816 -s 768 | C:\Windows\SysWOW64\WerFault.exe | ngown.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3540 | C:\WINDOWS\system32\WerFault.exe -u -p 6564 -s 1788 | C:\Windows\System32\WerFault.exe | freedom.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4552 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4816 | "C:\Users\admin\Desktop\Files\ngown.exe" | C:\Users\admin\Desktop\Files\ngown.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 3221225477 Modules
| |||||||||||||||
| (PID) Process: | (4552) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (4552) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (4552) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: 4EADC76600000000 | |||
| (PID) Process: | (4552) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F0062000000000000000000000001000000FFFFFFFFFFFF0000 | |||
| (PID) Process: | (6732) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (6732) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6732) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (6732) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (6732) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (6732) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6932 | anticheat.exe | C:\Users\Public\Desktop\Google Chrome.lnk | lnk | |
MD5:BE0F6E574127D7FFA7539F0C862BF8C1 | SHA256:9BB43669741962052FBD438637B8C2827A91CC7D8044CE3869090860E3ADDD6F | |||
| 6932 | anticheat.exe | C:\Users\Public\Desktop\Microsoft Edge.lnk | lnk | |
MD5:B5B1C756B73978D2DDE2F895F1007F2A | SHA256:7AAD92562A4E9A2D368490442CE75A2793AC0033D0B39C8EF466724863A3B27F | |||
| 6732 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\dmshell.exe | executable | |
MD5:A62ABDEB777A8C23CA724E7A2AF2DBAA | SHA256:84BDE93F884B8308546980EB551DA6D2B8BC8D4B8F163469A39CCFD2F9374049 | |||
| 4552 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 6476 | pei.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\newtpp[1].exe | executable | |
MD5:BE9388B42333B3D4E163B0ACE699897B | SHA256:D281E0A0F1E1073F2D290A7EB1F77BED4C210DBF83A0F4F4E22073F50FAA843F | |||
| 6732 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\aaa.exe | executable | |
MD5:1318FBC69B729539376CB6C9AC3CEE4C | SHA256:E972FB08A4DCDE8D09372F78FE67BA283618288432CDB7D33015FC80613CB408 | |||
| 6932 | anticheat.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\76b53b3ec448f7ccdda2063b15d2bfc3_bb926e54-e3ca-40fd-ae90-2764341e7792 | dbf | |
MD5:BBC8DA7D36DF3F91C460984C2ABE8419 | SHA256:0399CCF5E780949A63400736A46CCE7D1879903D0F45C6B7D194C960BA4DDDC2 | |||
| 6732 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\tt.exe | executable | |
MD5:ABABCA6D12D96E8DD2F1D7114B406FAE | SHA256:A992920E64A64763F3DD8C2A431A0F5E56E5B3782A1496DE92BC80EE71CCA5BA | |||
| 4552 | explorer.exe | C:\Users\admin\Desktop\Files\Downdd.exe | executable | |
MD5:C2B59AF47AF63068FBA9F72206AA477D | SHA256:68B64E2C7EE3665B60678B698B59EF3953A974D77622E50FC1F806E62D568C5D | |||
| 6476 | pei.exe | C:\Users\admin\AppData\Local\Temp\1804925973.exe | executable | |
MD5:BE9388B42333B3D4E163B0ACE699897B | SHA256:D281E0A0F1E1073F2D290A7EB1F77BED4C210DBF83A0F4F4E22073F50FAA843F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6732 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.16:80 | http://185.215.113.16/inc/anticheat.exe | unknown | — | — | unknown |
6732 | 4363463463464363463463463.exe | GET | 200 | 58.23.215.156:8765 | http://58.23.215.156:8765/Downdd.exe | unknown | — | — | unknown |
5940 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6732 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.84:80 | http://yzcplsibdtq.tsrv1.ws/pei.exe | unknown | — | — | malicious |
6732 | 4363463463464363463463463.exe | GET | 200 | 185.216.214.225:80 | http://185.216.214.225/freedom.exe | unknown | — | — | malicious |
6732 | 4363463463464363463463463.exe | GET | 200 | 172.105.66.118:80 | http://172.105.66.118/payloads/dmshell.exe | unknown | — | — | unknown |
6732 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.84:80 | http://72ec8d09-fce8-4272-9829-f4a17ae33269.random.tsrv1.ws/r.exe | unknown | — | — | malicious |
6732 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.66:80 | http://skyjsihnqew.fihsifuiiusuiuduf.com/tdrpload.exe | unknown | — | — | malicious |
6732 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.84:80 | http://blog.tsrv1.ws/aaa.exe | unknown | — | — | malicious |
6732 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.66:80 | http://privacy.aefiabeuodbauobfafoebbf.net/npp.exe | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4436 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2120 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
3412 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6732 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
6732 | 4363463463464363463463463.exe | 185.215.113.16:80 | — | 1337team Limited | SC | malicious |
6732 | 4363463463464363463463463.exe | 58.23.215.156:8765 | — | CHINA UNICOM China169 Backbone | CN | malicious |
6932 | anticheat.exe | 38.180.203.208:14238 | — | COGENT-174 | US | malicious |
3412 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
yzcplsibdtq.tsrv1.ws |
| malicious |
72ec8d09-fce8-4272-9829-f4a17ae33269.random.tsrv1.ws |
| malicious |
skyjsihnqew.fihsifuiiusuiuduf.com |
| unknown |
blog.tsrv1.ws |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6732 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6732 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6732 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
Process | Message |
|---|---|
freedom.exe | CLR: Managed code called FailFast without specifying a reason.
|