| File name: | ZAMÓWIENIE_NR.25051911739820011.IMG |
| Full analysis: | https://app.any.run/tasks/97ab7182-551d-42ab-8692-da15c8649002 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | May 19, 2025, 08:03:39 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-iso9660-image |
| File info: | UDF filesystem data (version 1.5) 'DATA_ENCONDER_CRYPTED' |
| MD5: | FFF5BCD01A32758EB18B49AC207C3159 |
| SHA1: | 9E050FF34C8AC4537DCECF9E283DEEAEC81380F3 |
| SHA256: | 375436EC14B6521D25EFC2708546BB59D22080A53F4759A90631C45914180FF4 |
| SSDEEP: | 49152:447BPdtw/4EvQ2Z+LakqW6uWLKCnODHsCDrfqXI+D+Cg2BXwLqqMTQR3yV1fZxuA:447BPdtw/4Eo20LavWK4DsCDmb+721wG |
| .iso | | | ISO 9660 CD image (27.6) |
|---|---|---|
| .atn | | | Photoshop Action (27.1) |
| .gmc | | | Game Music Creator Music (6.1) |
| VolumeName: | DATA_ENCONDER_CRYPTED |
|---|---|
| VolumeBlockCount: | 820 |
| VolumeBlockSize: | 2048 |
| RootDirectoryCreateDate: | 2025:05:19 09:33:19+03:00 |
| VolumeSetName: | UNDEFINED |
| Software: | IMGBURN V2.5.8.0 - THE ULTIMATE IMAGE BURNER! |
| VolumeCreateDate: | 2025:05:19 09:33:19.00+03:00 |
| VolumeModifyDate: | 2025:05:19 09:33:19.00+03:00 |
| VolumeSize: | 1679 kB |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 904 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5492 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | — | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5800 | "C:\WINDOWS\SysWOW64\msiexec.exe" | C:\Windows\SysWOW64\msiexec.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7432 | "C:\WINDOWS\Explorer.exe" | C:\Windows\explorer.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7772 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7804 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8024 | "D:\ZAMÓWIENIE_NR.25051911739820011.exe" | D:\ZAMÓWIENIE_NR.25051911739820011.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: interaural niter Exit code: 1 Modules
| |||||||||||||||
| 8112 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Appellant=GC -raw 'C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\compromiser.leo';$Dirtied=$Appellant.SubString(51144,3);.$Dirtied($Appellant)" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | ZAMÓWIENIE_NR.25051911739820011.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8120 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 04000000030000000E00000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4 |
| Operation: | write | Name: | MRUListEx |
Value: 020000000000000004000000050000000100000003000000FFFFFFFF | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar |
| Operation: | write | Name: | Locked |
Value: 1 | |||
| (PID) Process: | (7432) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: E2E52A6800000000 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F00620000000000000000000000010000000000000000000000 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 03000000040000000E00000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\Rectitic\morforldre.unr | — | |
MD5:— | SHA256:— | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\Temp\nswDFF3.tmp | — | |
MD5:— | SHA256:— | |||
| 5492 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Epigrafikerens.jpg | binary | |
MD5:B0F9C998AAA685751E77F2B4C6BDF880 | SHA256:5076C7C45B6F617FE298E14EE1098E670A863152073E8976727DEE74E52AEB25 | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\computate.jpg | binary | |
MD5:AFF1A5EBD11438F491A6311E9A52E798 | SHA256:C4BE53D1D1863579134EB637409DC3EA4C9227112BC830044F7DBC2A34D7A931 | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\compromiser.leo | text | |
MD5:B1E357E849D1506CAB456C1635ADC9C8 | SHA256:3CC66A8B2C2B1E2DCEFD9F9F5A395C27893F997A2DDEDC912F66A172A0EAD252 | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\dejunkerize.ini | text | |
MD5:495FBE3E4867B6F0C6816DBD1B7D9F72 | SHA256:7AD83843DBB2BA10328630E0D9B32D9846340A8CFBAE510CD22CFD59F9594013 | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\Rectitic\reflektantens.jpg | binary | |
MD5:C9EDC2BA48E6590C99726236B0FB53BE | SHA256:D78663F7AF69D8E53C34F78D6CC1441386A6F756B90F81E67965C520FCC71E1A | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\embattles.ini | text | |
MD5:5EF45F5BE0B374320FF9ECBB33A6244E | SHA256:9885A8F649FD2571FAF9D20F8B7A13D1521C42E6AFD67014EBA989E2FFA8784E | |||
| 8024 | ZAMÓWIENIE_NR.25051911739820011.exe | C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\falsummerne.ini | text | |
MD5:DFF4D0A9335F95E98FBCA78392A30EB4 | SHA256:ABB72148E38AA3E6A2E161613E75A0AA4E9D52B2F869AE505887D6552045F31F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
536 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
536 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7660 | backgroundTaskHost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | whitelisted |
5800 | msiexec.exe | GET | 200 | 2.19.105.127:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
7568 | svchost.exe | 23.35.238.131:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
6544 | svchost.exe | 20.190.160.14:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5800 | msiexec.exe | Misc activity | INFO [ANY.RUN] FTP protocol command for uploading a file |
5800 | msiexec.exe | A Network Trojan was detected | STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP) |
5800 | msiexec.exe | A Network Trojan was detected | ET MALWARE AgentTesla Exfil via FTP |
5800 | msiexec.exe | A Network Trojan was detected | STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP) |
5800 | msiexec.exe | Misc activity | INFO [ANY.RUN] FTP server is ready for the new user |