| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/e06222b2-c568-47e1-9f7d-811e4a86de21 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | February 15, 2024, 05:36:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:/' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | comSvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 128 | C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 292 | "C:\Users\admin\Desktop\Files\07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe" | C:\Users\admin\Desktop\Files\07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 448 | "C:\Windows\system32\dialer.exe" | C:\Windows\System32\dialer.exe | net.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Windows Phone Dialer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 712 | schtasks.exe /create /tn "qemu-gaq" /sc MINUTE /mo 13 /tr "'C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\qemu-ga.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 748 | "C:\Users\admin\Desktop\Files\qt51crk.exe" | C:\Users\admin\Desktop\Files\qt51crk.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 764 | "C:\Users\admin\AppData\Roaming\configurationValue\bott.exe" | C:\Users\admin\AppData\Roaming\configurationValue\bott.exe | RegAsm.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: XHP Exit code: 0 Version: 12.9.1.22 Modules
| |||||||||||||||
| 840 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | comSvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 864 | "C:\Users\admin\Desktop\Files\bin.exe" | C:\Users\admin\Desktop\Files\bin.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: filerede partshringsregelen knallerist Exit code: 0 Version: 3.4.0.0 Modules
| |||||||||||||||
| 880 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | comSvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2848) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2848 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exe | executable | |
MD5:5A78962AF28AD4733562FBBE0B73C8AE | SHA256:865B3DB67F0565E0B41E72AA036D78183C33DAB95BD4BE7B4F13AEBDA88AB0C0 | |||
| 3500 | payload.exe | C:\Users\admin\AppData\Local\Temp\runtime-bind.exe | executable | |
MD5:679F7BB9C60003A65A6A98D474F3FB0E | SHA256:FE0C2C6438A5ED2DD338A52678B1D5BE0A63DE608BD360437129976AE19EE1C1 | |||
| 1020 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:42E3956892291F5EE35E1B989213EF05 | SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468 | |||
| 1824 | peterzx.exe | C:\Users\admin\AppData\Local\Temp\Cab7327.tmp | compressed | |
MD5:AC05D27423A85ADC1622C714F2CB6184 | SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D | |||
| 1020 | powershell.exe | C:\Users\admin\AppData\Local\Temp\dul1ut3b.snq.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 1824 | peterzx.exe | C:\Users\admin\AppData\Roaming\KaGeys\KaGeys.exe | executable | |
MD5:CFE973E132B12ABA1AA2C13560071969 | SHA256:2CE0AD043E6F2C693EB6D5A2274BBF80431A9FC337D72499384ACD5EF5D5CE34 | |||
| 1824 | peterzx.exe | C:\Users\admin\AppData\Local\Temp\Tar7328.tmp | binary | |
MD5:9C0C641C06238516F27941AA1166D427 | SHA256:4276AF3669A141A59388BC56A87F6614D9A9BDDDF560636C264219A7EB11256F | |||
| 1824 | peterzx.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:AC05D27423A85ADC1622C714F2CB6184 | SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D | |||
| 1020 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF188a59.TMP | binary | |
MD5:0268C3470C936E6FBAC2945B9E1C2099 | SHA256:DF2AF58E8879B48826D8A418ED3B02CC8D484BCFC231C5B7A11BD153ED3998E9 | |||
| 2848 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\hncc.exe | executable | |
MD5:C227E22771466226949F8C53AF85465C | SHA256:440A17E8DBD0BFAD5F1587FE8C758E9461106EB7B04235477D4B7CAB156FCFBF | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2848 | 4363463463464363463463463.exe | GET | 200 | 60.220.213.207:80 | http://d1.udashi.com/soft/aqsd/5084/%E5%A4%A9%E9%99%8D%E6%BF%80%E5%85%89%E7%82%AE-%E5%9B%BE%E5%83%8F%E7%95%8C%E9%9D%A2%E7%89%88.exe | unknown | executable | 1.91 Mb | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.8:80 | http://185.172.128.8/cp.exe | unknown | executable | 1.84 Mb | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 193.233.132.167:80 | http://193.233.132.167/lend/for.exe | unknown | executable | 1.57 Mb | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 94.53.120.109:80 | http://94.53.120.109/dusers.exe | unknown | executable | 207 Kb | unknown |
3084 | rgAcb2.exe | POST | 200 | 91.215.85.223:80 | http://parals.ac.ug/index.php | unknown | text | 4 b | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.19:80 | http://185.172.128.19/costa.exe | unknown | executable | 6.63 Mb | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 91.215.85.223:80 | http://marksidfg.ug/native.exe | unknown | executable | 2.13 Mb | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 193.176.31.152:81 | http://193.176.31.152:81/amin.exe | unknown | binary | 354 b | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 195.20.16.46:80 | http://195.20.16.46/api/StealerClient_Cpp_1_4.exe | unknown | executable | 1.25 Mb | unknown |
2848 | 4363463463464363463463463.exe | GET | 200 | 172.67.175.19:80 | http://dlink.metallc.top/pages/peterzx.exe | unknown | executable | 843 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2848 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2848 | 4363463463464363463463463.exe | 140.82.121.3:443 | github.com | GITHUB | US | unknown |
2848 | 4363463463464363463463463.exe | 185.199.108.133:443 | raw.githubusercontent.com | FASTLY | US | unknown |
2848 | 4363463463464363463463463.exe | 68.66.226.93:80 | thedoctorsgym.net | A2HOSTING | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2848 | 4363463463464363463463463.exe | 172.67.175.19:80 | dlink.metallc.top | CLOUDFLARENET | US | unknown |
2848 | 4363463463464363463463463.exe | 211.149.230.178:80 | hseda.com | CHINANET SiChuan Telecom Internet Data Center | CN | unknown |
2848 | 4363463463464363463463463.exe | 91.215.85.223:80 | hubvera.ac.ug | — | RU | unknown |
1824 | peterzx.exe | 172.67.74.152:443 | api.ipify.org | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
thedoctorsgym.net |
| unknown |
dlink.metallc.top |
| unknown |
hseda.com |
| malicious |
hubvera.ac.ug |
| unknown |
api.ipify.org |
| shared |
ip-api.com |
| shared |
cdn.discordapp.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
2848 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2848 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2848 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1080 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2848 | 4363463463464363463463463.exe | A Network Trojan was detected | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 |
2848 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2848 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
2848 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING Request to .TOP Domain with Minimal Headers |
2848 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2848 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
4363463463464363463463463.exe | An exception occurred during a WebClient request.
|
ladas.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | An exception occurred during a WebClient request.
|
amert.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|