File name:

ASW.exe

Full analysis: https://app.any.run/tasks/19446a2a-d86c-4a61-85fd-2998e4e5c0f0
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: September 13, 2024, 19:44:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
ftp
stealer
agenttesla
exfiltration
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5:

634121B2AF66DD5433C1155702ABC84C

SHA1:

F3FD2A1800C4272BDF8209FF47E3703A4923E699

SHA256:

499DF614B640E6E6531F32CEB3271D7D661F5256D49F57E9D360A4791D37943F

SSDEEP:

49152:dDX8WT9544og/gLGtsIu/aMxrg5+FGgXJo0NhUfa1ydgf0WuAH/i2Ew07DWc:J5roy8xLrQDV0NIa1L0WuqNdc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • ASW.exe (PID: 6840)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 7132)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 7132)
    • Connects to the CnC server

      • RegSvcs.exe (PID: 7132)
    • AGENTTESLA has been detected (SURICATA)

      • RegSvcs.exe (PID: 7132)
    • Stealers network behavior

      • RegSvcs.exe (PID: 7132)
    • AGENTTESLA has been detected (YARA)

      • RegSvcs.exe (PID: 7132)
  • SUSPICIOUS

    • Reads the BIOS version

      • ASW.exe (PID: 6840)
    • Reads security settings of Internet Explorer

      • ASW.exe (PID: 6840)
    • Read disk information to detect sandboxing environments

      • ASW.exe (PID: 6840)
    • The process checks if it is being run in the virtual environment

      • ASW.exe (PID: 6840)
    • Reads the date of Windows installation

      • ASW.exe (PID: 6840)
    • Starts POWERSHELL.EXE for commands execution

      • ASW.exe (PID: 6840)
    • Script adds exclusion path to Windows Defender

      • ASW.exe (PID: 6840)
    • Checks for external IP

      • RegSvcs.exe (PID: 7132)
      • svchost.exe (PID: 2256)
    • Connects to FTP

      • RegSvcs.exe (PID: 7132)
    • Connects to unusual port

      • RegSvcs.exe (PID: 7132)
    • Executes application which crashes

      • ASW.exe (PID: 6840)
  • INFO

    • Checks supported languages

      • ASW.exe (PID: 6840)
      • RegSvcs.exe (PID: 7132)
    • Reads the computer name

      • ASW.exe (PID: 6840)
      • RegSvcs.exe (PID: 7132)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4820)
    • The process uses the downloaded file

      • ASW.exe (PID: 6840)
    • Reads the machine GUID from the registry

      • ASW.exe (PID: 6840)
      • RegSvcs.exe (PID: 7132)
    • Process checks computer location settings

      • ASW.exe (PID: 6840)
    • Disables trace logs

      • RegSvcs.exe (PID: 7132)
    • Checks proxy server information

      • RegSvcs.exe (PID: 7132)
      • WerFault.exe (PID: 4820)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2136)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2136)
    • Reads the software policy settings

      • WerFault.exe (PID: 4820)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:09:12 19:28:30+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 16282
InitializedDataSize: 69578
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Boulloart
FileDescription: Boulloart
FileVersion: 1.0.0.0
InternalName: Sochi.exe
LegalCopyright: Copyright © Boulloart 2024
LegalTrademarks: Boulloart
OriginalFileName: Sochi.exe
ProductName: Boulloart
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start asw.exe powershell.exe no specs conhost.exe no specs #AGENTTESLA regsvcs.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2136"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\admin\Desktop\ASW.exe" -ForceC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeASW.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4820C:\WINDOWS\system32\WerFault.exe -u -p 6840 -s 1324C:\Windows\System32\WerFault.exe
ASW.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
6644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6840"C:\Users\admin\Desktop\ASW.exe" C:\Users\admin\Desktop\ASW.exe
explorer.exe
User:
admin
Company:
Boulloart
Integrity Level:
MEDIUM
Description:
Boulloart
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\asw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7132"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
ASW.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
13 379
Read events
13 364
Write events
15
Delete events
0

Modification events

(PID) Process:(6840) ASW.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Operation:writeName:Enabled
Value:
0
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7132) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
0
Suspicious files
2
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
4820WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ASW.exe_1ea351fb66b7653011c7b380214bb3684a8f3b_dea20013_2a57fff0-5460-4af3-b819-ec50d1b41562\Report.wer
MD5:
SHA256:
4820WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\ASW.exe.6840.dmp
MD5:
SHA256:
2136powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lcispyzb.2od.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4820WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC125.tmp.dmpbinary
MD5:604EBFC0834954B3877AA69B70B8A49B
SHA256:0C1EBA60F1F13FCB1D0B85265EA31ED97D143D50DC924625A8BFE9F514FA4C5C
2136powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_or2svwie.1xt.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2136powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:FB2D11567358B0B4AFEFFE03EE0DF163
SHA256:8BC305431CF56D48D72A4577FA72F413CB38F3B8F84C78D98749C8BD03F21919
4820WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC2EC.tmp.xmlxml
MD5:33ECADE06C105ED3E551ED1F13D21A03
SHA256:CBC7FC5700F0FE95EAF507CC70245F3501A0B3547FA4521DB185D8FC07C3838D
4820WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC2CC.tmp.WERInternalMetadata.xmlxml
MD5:7C86E490E1702D5ADDA149B9A675B76F
SHA256:1669F5353A8A310FB5527FA60BE0C6E4A36007256D355DAEE3D7084BB0F47D02
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
17
DNS requests
7
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
23.32.97.216:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7132
RegSvcs.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2400
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6420
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
23.32.97.216:80
www.microsoft.com
AKAMAI-AS
SE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
2400
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4820
WerFault.exe
20.189.173.22:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7132
RegSvcs.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
shared
7132
RegSvcs.exe
173.254.31.34:21
ftp.fosna.net
UNIFIEDLAYER-AS-1
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.206
whitelisted
www.microsoft.com
  • 23.32.97.216
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.22
whitelisted
ip-api.com
  • 208.95.112.1
shared
ftp.fosna.net
  • 173.254.31.34
unknown

Threats

PID
Process
Class
Message
2256
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2256
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
7132
RegSvcs.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
7132
RegSvcs.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
7132
RegSvcs.exe
Misc activity
INFO [ANY.RUN] FTP protocol command for uploading a file
7132
RegSvcs.exe
A Network Trojan was detected
ET MALWARE AgentTesla Exfil via FTP
7132
RegSvcs.exe
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
7132
RegSvcs.exe
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
7132
RegSvcs.exe
Misc activity
INFO [ANY.RUN] FTP server is ready for the new user
2 ETPRO signatures available at the full report
No debug info