| File name: | Nationalbankdirektrernes.exe |
| Full analysis: | https://app.any.run/tasks/9f092248-7df0-4137-81b0-4cd4601f9be6 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | May 15, 2025, 18:54:42 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | 03398A60158C06500C3B628F7C6E61A9 |
| SHA1: | 4EF894C198E26DD1211A1BCCD585CF570E1B0A06 |
| SHA256: | 4C31167D6E80129A4F8EBEAE1C6E3109B7D0A19DC33F126D6083CEC4795448C7 |
| SSDEEP: | 49152:8vHNlnFjgtZ6WWDQ2iJLsKlX9q4kSaCvOdV0v3Df96++LR5Lg1tWlcDem7tl35UT:QbnF46xc2iqKz8SaC2W7FUcnDeUtreW6 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2015:08:05 00:46:24+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24064 |
| InitializedDataSize: | 141824 |
| UninitializedDataSize: | 2048 |
| EntryPoint: | 0x31ff |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.0.0.0 |
| ProductVersionNumber: | 3.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| Comments: | United Auto Group Inc |
| CompanyName: | R.R. Donnelley & Sons Company |
| FileDescription: | ACT Manufacturing Inc. |
| FileVersion: | 3.0.0.0 |
| LegalCopyright: | Texas Instruments Incorporated |
| LegalTrademarks: | Hawaiian Electric Industries Inc. |
| OriginalFileName: | antiforureningens strafcellerne.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1276 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2600 | "C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe" | C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe | Nationalbankdirektrernes.exe | ||||||||||||
User: admin Company: R.R. Donnelley & Sons Company Integrity Level: MEDIUM Description: ACT Manufacturing Inc. Version: 3.0.0.0 Modules
| |||||||||||||||
| 5508 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5972 | "C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe" | C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe | explorer.exe | ||||||||||||
User: admin Company: R.R. Donnelley & Sons Company Integrity Level: MEDIUM Description: ACT Manufacturing Inc. Exit code: 0 Version: 3.0.0.0 Modules
| |||||||||||||||
| 6080 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: u | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\Nondivulging188\adagietto\frustrate |
| Operation: | write | Name: | deletimen |
Value: 8E23 | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: us | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: use | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: user | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: user3 | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: user32 | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: user32: | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: user32:: | |||
| (PID) Process: | (5972) Nationalbankdirektrernes.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Locales Approx |
| Operation: | write | Name: | C Langs |
Value: user32::S | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Sammenhftet.doi | — | |
MD5:— | SHA256:— | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\indsprjtendes.men | — | |
MD5:— | SHA256:— | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Decaying4.jpg | image | |
MD5:D1700D41EA6D5C123BFFD67CBB35D092 | SHA256:89AB11AC727C380ED9BC50AF6AB2AD2E21D2BF4486FD49CC8516C78A8F11BC29 | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Skrperne131.Nor | binary | |
MD5:C4600BFDC295F255D05EFA1F7EEE1D03 | SHA256:D721C05B35A5C5BC7DF4AF843566737D47ED05D04B1B074F319C1A9258384FB2 | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\galvanically.ini | text | |
MD5:4A2F65362C73B4254B305D9DA68CBC99 | SHA256:4F2785E875C03597EA770311298E7E4144301FC09BC8EF63A62FD93BE79BCD4F | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Nitrosomonas.jpg | image | |
MD5:C1D1BC2144C0CEC5443677A2255A8DB6 | SHA256:AB0E36C770A0EF41F4344FB25EB6A38138D55B7EF98FB8B89E5034F6B02A1F26 | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Polysyllabically18.jpg | image | |
MD5:BBBBD4EBA26F7C07A2D391B985DA0B55 | SHA256:F9E930C60CC641ECBA8D2B5181E5EC48DE6254D672AC0E079EE4DF42723B8F84 | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\enteroptosis.rek | binary | |
MD5:2215256C443913E86FB9BD1669D43737 | SHA256:D7C60D7E29BD6A502DF080FCC5EB66D8784686702ECDA2E332F6F24B5B7CA2F8 | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\figwort.ini | text | |
MD5:DF7D47F5A4CDDFEF00D9C85849D531C1 | SHA256:4A2F78F3C47A69BE3088DC8821102855CBB4519F948839B03B76D12C49A8A80F | |||
| 5972 | Nationalbankdirektrernes.exe | C:\Users\admin\hundredfold\optativs\Uncontainableness\Undefeatedness.beb | binary | |
MD5:C35D1C5CC91DF36779C1BD7EC7E157D7 | SHA256:B3EA28EB2640F97C12778B77027E2E632348BA67810275BA50A2119F87642CDD | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 92.123.22.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6436 | firefox.exe | GET | 200 | 34.107.221.82:80 | http://detectportal.firefox.com/canonical.html | unknown | — | — | whitelisted |
5728 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2600 | Nationalbankdirektrernes.exe | GET | 200 | 75.127.7.164:80 | http://75.127.7.164/rMupHxJuMgY210.bin | unknown | — | — | unknown |
5728 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6436 | firefox.exe | GET | 200 | 34.107.221.82:80 | http://detectportal.firefox.com/success.txt?ipv4 | unknown | — | — | whitelisted |
2600 | Nationalbankdirektrernes.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.16.168.124:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
— | — | 92.123.22.101:80 | www.microsoft.com | AKAMAI-AS | AT | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2112 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6436 | firefox.exe | 34.107.221.82:80 | detectportal.firefox.com | GOOGLE | US | whitelisted |
6544 | svchost.exe | 40.126.31.67:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
detectportal.firefox.com |
| whitelisted |
prod.detectportal.prod.cloudops.mozgcp.net |
| whitelisted |
example.org |
| whitelisted |
ipv4only.arpa |
| whitelisted |
login.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2600 | Nationalbankdirektrernes.exe | Potentially Bad Traffic | ET HUNTING Generic .bin download from Dotted Quad |
2196 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
2600 | Nationalbankdirektrernes.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
2600 | Nationalbankdirektrernes.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
2600 | Nationalbankdirektrernes.exe | Misc activity | INFO [ANY.RUN] FTP protocol command for uploading a file |
2600 | Nationalbankdirektrernes.exe | A Network Trojan was detected | STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP) |
2600 | Nationalbankdirektrernes.exe | A Network Trojan was detected | STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP) |
2600 | Nationalbankdirektrernes.exe | A Network Trojan was detected | ET MALWARE AgentTesla Exfil via FTP |
2600 | Nationalbankdirektrernes.exe | Misc activity | INFO [ANY.RUN] FTP server is ready for the new user |