| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/4ea922c5-943d-4cf7-8250-e9a1fc193745 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | February 12, 2024, 13:23:08 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | "C:\Users\admin\Desktop\Files\win.exe" | C:\Users\admin\Desktop\Files\win.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 120 | "schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Users\admin\Desktop\Files\Temp2.exe" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | Temp2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 316 | "C:\Users\admin\Desktop\Files\data64_5.exe" | C:\Users\admin\Desktop\Files\data64_5.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 480 | "C:\Users\admin\Desktop\4363463463464363463463463.exe" | C:\Users\admin\Desktop\4363463463464363463463463.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 0.0.0.0 Modules
| |||||||||||||||
| 480 | "C:\Users\admin\Desktop\Files\for.exe" | C:\Users\admin\Desktop\Files\for.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Company: Guardrails Aloin Cogent Integrity Level: HIGH Description: List Controller Setup Exit code: 0 Version: 1.0.0.0 Modules
RedLine(PID) Process(480) for.exe C2 (1)185.172.128.33:8924 Botnet@logscloudyt_bot Options ErrorMessage Keys XorConsumer | |||||||||||||||
| 480 | "C:\Users\admin\Desktop\Files\idrB5Event.exe" | C:\Users\admin\Desktop\Files\idrB5Event.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Company: iTop Integrity Level: HIGH Description: iTop Black Friday Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 668 | "C:\Users\admin\Desktop\4363463463464363463463463.exe" | C:\Users\admin\Desktop\4363463463464363463463463.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 796 | "C:\Users\admin\Desktop\Files\dsdasda.exe" | C:\Users\admin\Desktop\Files\dsdasda.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Company: Performance Booster Integrity Level: HIGH Description: Grizzly Eternal Fabric Exit code: 3221225477 Version: 1.0.0.0 Modules
| |||||||||||||||
| 840 | "C:\Users\admin\Desktop\4363463463464363463463463.exe" | C:\Users\admin\Desktop\4363463463464363463463463.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 884 | "C:\Users\admin\AppData\Local\Temp\april.exe" | C:\Users\admin\AppData\Local\Temp\april.exe | superz.exe | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: WebSocket connection routine Setup Exit code: 0 Version: Modules
| |||||||||||||||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3216) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4092 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\Doublepulsar-1.3.1.exe | executable | |
MD5:C24315B0585B852110977DACAFE6C8C1 | SHA256:15FFBB8D382CD2FF7B0BD4C87A7C0BFFD1541C2FE86865AF445123BC0B770D13 | |||
| 668 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\f4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exe | executable | |
MD5:8E34D5CF7E39F355CDAA0A9BA0533901 | SHA256:F4438ED05971A15D70C9683DC9E1A55C583EA8C61039E9E85EB391CA6E3FA0AE | |||
| 1628 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\ed.exe | executable | |
MD5:25CA432628E62C0C1C9DA458A8A92BCA | SHA256:F4D0F5FE6A6D8A08AF49798B15856A79D9DD5319D1EF4BEAC63883379EA17E71 | |||
| 1628 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\plink.exe | executable | |
MD5:7E559DC4E162F6AAEE6A034FA2D9C838 | SHA256:4C2E05ACAD9E625BA60CA90FA7CCE6A1B11A147E00F43E0F29225FAEFF6B54AA | |||
| 4092 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\Temp2.exe | executable | |
MD5:5EBE890F034F15D9500328551B76A01E | SHA256:3588657707CD5B04586693C6600BE0159B321B258F48953F824FAA876F6B8566 | |||
| 3232 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\svchost.exe | executable | |
MD5:A4D0F1FC59C798520A9733366B3E5D38 | SHA256:C162762C875E3F77E5BA98ACFE55D0A6177F9CFF23010C5DE537BE7BBC7E5417 | |||
| 4004 | 15c63318bd5a529e599e5d60302f2dc14961ebcc209b735796efbfdb4c1d59fd.exe | C:\Windows\Temp\1.vbs | text | |
MD5:07E1E48D3DF9B78F2FC2DB6CF3F81A55 | SHA256:9B6BEA54B95A14045F6B527675A9456FD4D8D22DCD22E0D1EEDAC440FE8B02FB | |||
| 668 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\miner.exe | executable | |
MD5:CAFEAB1513FF424CC79CAECA170678D1 | SHA256:71F7D548C9EA57B8C9DCC3F426ADABDDDB4451E65837B63C4C25DC2A812717E2 | |||
| 2444 | asg.exe | C:\Users\admin\AppData\Roaming\WSUS Logs\02-12-2024 | binary | |
MD5:EF246BE9F8D9F1BC8CE1E196D091D414 | SHA256:35CB28A4681A856C46DA04531AEE703DC95CC8F801E7803F3BAFDD1B8578F7CE | |||
| 3504 | powershell.exe | C:\Users\admin\AppData\Local\Temp\snz1sizd.1ca.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3216 | 4363463463464363463463463.exe | GET | — | 91.215.85.223:80 | http://marksidfg.ug/ghjkl.exe | unknown | — | — | unknown |
— | — | GET | 200 | 107.161.183.211:80 | http://mail.alphaassessoriato.com.br/clp.exe | unknown | executable | 1.13 Mb | unknown |
1628 | 4363463463464363463463463.exe | GET | 200 | 5.148.32.222:6789 | http://5.148.32.222:6789/plink.exe | unknown | executable | 312 Kb | unknown |
3232 | 4363463463464363463463463.exe | GET | 200 | 62.109.150.108:80 | http://starozitnictvi-znojmo.cz/ed.exe | unknown | executable | 748 Kb | unknown |
1628 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.121:80 | http://185.172.128.121/svchost.exe | unknown | executable | 5.98 Mb | unknown |
840 | 4363463463464363463463463.exe | GET | 200 | 123.139.99.35:80 | http://d1.udashi.com/soft/aqsd/5084/%E5%A4%A9%E9%99%8D%E6%BF%80%E5%85%89%E7%82%AE-%E5%9B%BE%E5%83%8F%E7%95%8C%E9%9D%A2%E7%89%88.exe | unknown | executable | 1.91 Mb | unknown |
3748 | Temp2.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | binary | 293 b | unknown |
4092 | 4363463463464363463463463.exe | GET | 200 | 43.143.228.239:80 | http://43.143.228.239/LostArk.exe | unknown | executable | 203 Kb | unknown |
2596 | fcc.exe | POST | 200 | 65.21.213.208:3000 | http://65.21.213.208:3000/check | unknown | — | — | unknown |
3232 | 4363463463464363463463463.exe | GET | 200 | 208.86.224.90:80 | http://cd.textfiles.com/hmatrix/Data/hack1226.exe | unknown | — | 63.7 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3216 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3216 | 4363463463464363463463463.exe | 91.215.85.223:80 | marksidfg.ug | — | RU | unknown |
2420 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2420 | 4363463463464363463463463.exe | 104.192.141.1:443 | bitbucket.org | AMAZON-02 | US | unknown |
3072 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
3072 | 4363463463464363463463463.exe | 107.161.183.211:80 | mail.alphaassessoriato.com.br | DIMENOC | US | unknown |
2420 | 4363463463464363463463463.exe | 3.5.29.187:443 | bbuseruploads.s3.amazonaws.com | AMAZON-AES | US | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
marksidfg.ug |
| unknown |
bitbucket.org |
| shared |
mail.alphaassessoriato.com.br |
| unknown |
bbuseruploads.s3.amazonaws.com |
| shared |
starozitnictvi-znojmo.cz |
| unknown |
github.com |
| shared |
muzzumilruheel.com |
| malicious |
raw.githubusercontent.com |
| shared |
d1.udashi.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3216 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
3072 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
3072 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
3072 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3072 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1628 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1628 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
3232 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
3232 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
1628 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
4363463463464363463463463.exe | The request was aborted: Could not create SSL/TLS secure channel.
|
4363463463464363463463463.exe | The request was aborted: Could not create SSL/TLS secure channel.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
2-3-1_2023-12-14_13-35.exe | tw0xu14w8 |
2-3-1_2023-12-14_13-35.exe | tf9fnyzeu |
2-3-1_2023-12-14_13-35.exe | tv8nwi2ye |
2-3-1_2023-12-14_13-35.exe | tv8nwi2ye |