| File name: | wind.exe |
| Full analysis: | https://app.any.run/tasks/5fad7cc0-cd7d-4ed6-a302-94cb8dd98f86 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | July 14, 2023, 13:32:33 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 5AF410F004C467EC40F00A34B3D9A49F |
| SHA1: | 1D4EA61318BDC6298D46664F6D3DD92E8900FC71 |
| SHA256: | 518EF92BE84234185738F94F0FEF4DCD67CF58A9C424F6C0D4C4CD991DB9CAEF |
| SSDEEP: | 6144:vYa6oNE1rOl79P0I4vE77m/ZCemfOjiDPShGIY72TAGnkLxAk+V:vY2srOP0I9CIj+iDPShG1OAGnkLxANV |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| ProductName: | 26.79.85.83 |
|---|---|
| LegalCopyright: | Copyright dendrochronologist |
| FileVersion: | 26.79.85.83 |
| FileDescription: | inopportuneness |
| CompanyName: | whr |
| CharacterSet: | Unicode |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x0000 |
| ProductVersionNumber: | 26.79.85.83 |
| FileVersionNumber: | 26.79.85.83 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | 6 |
| OSVersion: | 4 |
| EntryPoint: | 0x3640 |
| UninitializedDataSize: | 2048 |
| InitializedDataSize: | 141824 |
| CodeSize: | 26624 |
| LinkerVersion: | 6 |
| PEType: | PE32 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| TimeStamp: | 2021:09:25 21:56:47+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 25-Sep-2021 21:56:47 |
| Detected languages: |
|
| CompanyName: | whr |
| FileDescription: | inopportuneness |
| FileVersion: | 26.79.85.83 |
| LegalCopyright: | Copyright dendrochronologist |
| ProductName: | 26.79.85.83 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000D8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 25-Sep-2021 21:56:47 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00006676 | 0x00006800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.41746 |
.rdata | 0x00008000 | 0x0000139A | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.14107 |
.data | 0x0000A000 | 0x00020378 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.11058 |
.ndata | 0x0002B000 | 0x00010000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x0003B000 | 0x00000CB8 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.20294 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.29934 | 830 | UNKNOWN | English - United States | RT_MANIFEST |
103 | 2.16096 | 20 | UNKNOWN | English - United States | RT_GROUP_ICON |
105 | 2.66174 | 256 | UNKNOWN | English - United States | RT_DIALOG |
106 | 2.88094 | 284 | UNKNOWN | English - United States | RT_DIALOG |
111 | 2.48825 | 96 | UNKNOWN | English - United States | RT_DIALOG |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
KERNEL32.dll |
SHELL32.dll |
USER32.dll |
ole32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2884 | "C:\Users\admin\AppData\Local\Temp\wind.exe" | C:\Users\admin\AppData\Local\Temp\wind.exe | explorer.exe | ||||||||||||
User: admin Company: whr Integrity Level: MEDIUM Description: inopportuneness Exit code: 0 Version: 26.79.85.83 Modules
| |||||||||||||||
| 3660 | "C:\Users\admin\AppData\Local\Temp\wind.exe" | C:\Users\admin\AppData\Local\Temp\wind.exe | wind.exe | ||||||||||||
User: admin Company: whr Integrity Level: MEDIUM Description: inopportuneness Exit code: 0 Version: 26.79.85.83 Modules
AgentTesla(PID) Process(3660) wind.exe Protocolsmtp Hostmail.icmpp.ro Port587 Usernamecvasile@icmpp.ro PasswordpuCHImic2019 | |||||||||||||||
| (PID) Process: | (3660) wind.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\155\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2884 | wind.exe | C:\Users\admin\AppData\Roaming\rbwgcluqajf\ojscxhqmrb.exe | executable | |
MD5:5AF410F004C467EC40F00A34B3D9A49F | SHA256:518EF92BE84234185738F94F0FEF4DCD67CF58A9C424F6C0D4C4CD991DB9CAEF | |||
| 2884 | wind.exe | C:\Users\admin\AppData\Local\Temp\nskA620.tmp\zitnf.dll | executable | |
MD5:9EF4A90783A187507F823EE3758DAE5D | SHA256:C11065E2D61C6CC4E269E1D18AA6C5B97E161829EC666942ACE848812C07A9D7 | |||
| 3660 | wind.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A | binary | |
MD5:D4AE187B4574036C2D76B6DF8A8C1A30 | SHA256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7 | |||
| 3660 | wind.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:43D589E026045049155CA6738CD5C63D | SHA256:7DD2CB9F8513B460C8866D49BD1AB7C9C7DD6103D25EC5A555AA5060B63C9680 | |||
| 3660 | wind.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:3AC860860707BAAF32469FA7CC7C0192 | SHA256:D015145D551ECD14916270EFAD773BBC9FD57FAD2228D2C24559F696C961D904 | |||
| 2884 | wind.exe | C:\Users\admin\AppData\Local\Temp\nsvA610.tmp | binary | |
MD5:CB8602E45F43C8020C1821B9B0061C65 | SHA256:37742717593320C4027EAC661E6964B9DCC4D2E4E7802A60DCBC8CEEFF70C38A | |||
| 3660 | wind.exe | C:\Users\admin\AppData\Local\Temp\TarBDFD.tmp | binary | |
MD5:4FF65AD929CD9A367680E0E5B1C08166 | SHA256:C8733C93CC5AAF5CA206D06AF22EE8DBDEC764FB5085019A6A9181FEB9DFDEE6 | |||
| 2884 | wind.exe | C:\Users\admin\AppData\Local\Temp\lmswi.bu | binary | |
MD5:CE2E8FC69F0A920A75CF0BDA39FC0129 | SHA256:58585CC53AE7899ACC307136850843A7F5E022FE1A9622E7FD1ACD51D92030EE | |||
| 3660 | wind.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A | binary | |
MD5:FD61636C8030976E02499A6576AC5B1E | SHA256:D32274C523E3C42BAEC87BABB58170A8372094FB6336EFB1EE10352869231896 | |||
| 3660 | wind.exe | C:\Users\admin\AppData\Local\Temp\CabBDFC.tmp | compressed | |
MD5:3AC860860707BAAF32469FA7CC7C0192 | SHA256:D015145D551ECD14916270EFAD773BBC9FD57FAD2228D2C24559F696C961D904 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3660 | wind.exe | GET | 200 | 67.27.233.254:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB039D4329A5E8.crt?cf0fd9808a246540 | US | binary | 1.36 Kb | whitelisted |
3660 | wind.exe | GET | 200 | 67.27.233.254:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?8b0661d3a646f191 | US | compressed | 62.3 Kb | whitelisted |
3660 | wind.exe | GET | 200 | 2.16.107.89:80 | http://apps.identrust.com/roots/dstrootcax3.p7c | unknown | binary | 893 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3660 | wind.exe | 193.138.98.3:587 | mail.icmpp.ro | Agentia de Administrare a Retelei Nationale de Informatica pentru Educatie si Cercetare | RO | malicious |
3660 | wind.exe | 2.16.107.89:80 | apps.identrust.com | Akamai International B.V. | DE | suspicious |
3660 | wind.exe | 67.27.233.254:80 | ctldl.windowsupdate.com | LEVEL3 | US | suspicious |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
3660 | wind.exe | 104.237.62.211:443 | api.ipify.org | WEBNX | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
api.ipify.org |
| shared |
mail.icmpp.ro |
| malicious |
apps.identrust.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3660 | wind.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Exfiltration via SMTP (AgentTesla) |