File name:

Nationalbankdirektrernes.exe

Full analysis: https://app.any.run/tasks/9f092248-7df0-4137-81b0-4cd4601f9be6
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 15, 2025, 18:54:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
guloader
evasion
stealer
ftp
exfiltration
agenttesla
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

03398A60158C06500C3B628F7C6E61A9

SHA1:

4EF894C198E26DD1211A1BCCD585CF570E1B0A06

SHA256:

4C31167D6E80129A4F8EBEAE1C6E3109B7D0A19DC33F126D6083CEC4795448C7

SSDEEP:

49152:8vHNlnFjgtZ6WWDQ2iJLsKlX9q4kSaCvOdV0v3Df96++LR5Lg1tWlcDem7tl35UT:QbnF46xc2iqKz8SaC2W7FUcnDeUtreW6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Nationalbankdirektrernes.exe (PID: 2600)
    • GULOADER has been detected (YARA)

      • Nationalbankdirektrernes.exe (PID: 5972)
      • Nationalbankdirektrernes.exe (PID: 2600)
    • GULOADER SHELLCODE has been detected (YARA)

      • Nationalbankdirektrernes.exe (PID: 5972)
      • Nationalbankdirektrernes.exe (PID: 2600)
    • Steals credentials from Web Browsers

      • Nationalbankdirektrernes.exe (PID: 2600)
    • AGENTTESLA has been detected (SURICATA)

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Actions looks like stealing of personal data

      • Nationalbankdirektrernes.exe (PID: 2600)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • Nationalbankdirektrernes.exe (PID: 5972)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Nationalbankdirektrernes.exe (PID: 5972)
    • Executable content was dropped or overwritten

      • Nationalbankdirektrernes.exe (PID: 5972)
    • There is functionality for taking screenshot (YARA)

      • Nationalbankdirektrernes.exe (PID: 5972)
      • Nationalbankdirektrernes.exe (PID: 2600)
    • Application launched itself

      • Nationalbankdirektrernes.exe (PID: 5972)
    • Reads security settings of Internet Explorer

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Connects to the server without a host name

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • Nationalbankdirektrernes.exe (PID: 2600)
    • Connects to FTP

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Connects to unusual port

      • Nationalbankdirektrernes.exe (PID: 2600)
  • INFO

    • Reads the computer name

      • Nationalbankdirektrernes.exe (PID: 5972)
      • Nationalbankdirektrernes.exe (PID: 2600)
    • Checks supported languages

      • Nationalbankdirektrernes.exe (PID: 5972)
      • Nationalbankdirektrernes.exe (PID: 2600)
    • The sample compiled with english language support

      • Nationalbankdirektrernes.exe (PID: 5972)
    • Create files in a temporary directory

      • Nationalbankdirektrernes.exe (PID: 5972)
    • Checks proxy server information

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Reads the machine GUID from the registry

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Disables trace logs

      • Nationalbankdirektrernes.exe (PID: 2600)
    • Reads the software policy settings

      • slui.exe (PID: 5508)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:08:05 00:46:24+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x31ff
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.0.0.0
ProductVersionNumber: 3.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: United Auto Group Inc
CompanyName: R.R. Donnelley & Sons Company
FileDescription: ACT Manufacturing Inc.
FileVersion: 3.0.0.0
LegalCopyright: Texas Instruments Incorporated
LegalTrademarks: Hawaiian Electric Industries Inc.
OriginalFileName: antiforureningens strafcellerne.exe
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GULOADER nationalbankdirektrernes.exe sppextcomobj.exe no specs slui.exe #AGENTTESLA nationalbankdirektrernes.exe svchost.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1276C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2600"C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe" C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe
Nationalbankdirektrernes.exe
User:
admin
Company:
R.R. Donnelley & Sons Company
Integrity Level:
MEDIUM
Description:
ACT Manufacturing Inc.
Version:
3.0.0.0
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\users\admin\appdata\local\temp\nationalbankdirektrernes.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5508"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5972"C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe" C:\Users\admin\AppData\Local\Temp\Nationalbankdirektrernes.exe
explorer.exe
User:
admin
Company:
R.R. Donnelley & Sons Company
Integrity Level:
MEDIUM
Description:
ACT Manufacturing Inc.
Exit code:
0
Version:
3.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\nationalbankdirektrernes.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6080C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 600
Read events
2 130
Write events
470
Delete events
0

Modification events

(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
u
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\Nondivulging188\adagietto\frustrate
Operation:writeName:deletimen
Value:
8E23
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
us
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
use
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
user
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
user3
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
user32
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
user32:
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
user32::
(PID) Process:(5972) Nationalbankdirektrernes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Locales Approx
Operation:writeName:C Langs
Value:
user32::S
Executable files
1
Suspicious files
6
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Sammenhftet.doi
MD5:
SHA256:
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\indsprjtendes.men
MD5:
SHA256:
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Decaying4.jpgimage
MD5:D1700D41EA6D5C123BFFD67CBB35D092
SHA256:89AB11AC727C380ED9BC50AF6AB2AD2E21D2BF4486FD49CC8516C78A8F11BC29
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Skrperne131.Norbinary
MD5:C4600BFDC295F255D05EFA1F7EEE1D03
SHA256:D721C05B35A5C5BC7DF4AF843566737D47ED05D04B1B074F319C1A9258384FB2
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\galvanically.initext
MD5:4A2F65362C73B4254B305D9DA68CBC99
SHA256:4F2785E875C03597EA770311298E7E4144301FC09BC8EF63A62FD93BE79BCD4F
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Nitrosomonas.jpgimage
MD5:C1D1BC2144C0CEC5443677A2255A8DB6
SHA256:AB0E36C770A0EF41F4344FB25EB6A38138D55B7EF98FB8B89E5034F6B02A1F26
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Polysyllabically18.jpgimage
MD5:BBBBD4EBA26F7C07A2D391B985DA0B55
SHA256:F9E930C60CC641ECBA8D2B5181E5EC48DE6254D672AC0E079EE4DF42723B8F84
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\enteroptosis.rekbinary
MD5:2215256C443913E86FB9BD1669D43737
SHA256:D7C60D7E29BD6A502DF080FCC5EB66D8784686702ECDA2E332F6F24B5B7CA2F8
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Moundsmen\figwort.initext
MD5:DF7D47F5A4CDDFEF00D9C85849D531C1
SHA256:4A2F78F3C47A69BE3088DC8821102855CBB4519F948839B03B76D12C49A8A80F
5972Nationalbankdirektrernes.exeC:\Users\admin\hundredfold\optativs\Uncontainableness\Undefeatedness.bebbinary
MD5:C35D1C5CC91DF36779C1BD7EC7E157D7
SHA256:B3EA28EB2640F97C12778B77027E2E632348BA67810275BA50A2119F87642CDD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
27
DNS requests
23
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
92.123.22.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
5728
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2600
Nationalbankdirektrernes.exe
GET
200
75.127.7.164:80
http://75.127.7.164/rMupHxJuMgY210.bin
unknown
unknown
5728
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
2600
Nationalbankdirektrernes.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
92.123.22.101:80
www.microsoft.com
AKAMAI-AS
AT
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6436
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
6544
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 92.123.22.101
  • 184.30.21.171
whitelisted
google.com
  • 142.250.74.206
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 96.7.128.192
  • 23.215.0.132
  • 96.7.128.186
  • 23.215.0.133
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
login.live.com
  • 40.126.31.67
  • 40.126.31.73
  • 40.126.31.130
  • 20.190.159.0
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.130
  • 20.190.159.131
whitelisted

Threats

PID
Process
Class
Message
2600
Nationalbankdirektrernes.exe
Potentially Bad Traffic
ET HUNTING Generic .bin download from Dotted Quad
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2600
Nationalbankdirektrernes.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2600
Nationalbankdirektrernes.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2600
Nationalbankdirektrernes.exe
Misc activity
INFO [ANY.RUN] FTP protocol command for uploading a file
2600
Nationalbankdirektrernes.exe
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
2600
Nationalbankdirektrernes.exe
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
2600
Nationalbankdirektrernes.exe
A Network Trojan was detected
ET MALWARE AgentTesla Exfil via FTP
2600
Nationalbankdirektrernes.exe
Misc activity
INFO [ANY.RUN] FTP server is ready for the new user
No debug info