| File name: | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7 |
| Full analysis: | https://app.any.run/tasks/d2ea64ab-0a6e-4257-8c9a-46666a4c8488 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | September 03, 2025, 17:13:41 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | ADE450C7A2B33CA4502E5AADC1CFDFEA |
| SHA1: | 8BBFB32AE8E014F72CE8E984ECF4F314A6438A76 |
| SHA256: | 522DF31FA6822A48A743918CC4371DAAA6CA5AADE2713DDF6E4A7726C78D54A7 |
| SSDEEP: | 12288:CbxJWY62duZifTigwKmTeO99bImyPP1H+oTDLdjq5Kax6C5wUeWxFD:52duZifTigwK4j99bP8LdoKaxvejW/ |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:04:15 10:52:23+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 659968 |
| InitializedDataSize: | 69632 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xa2ff2 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | NYju.exe |
| LegalCopyright: | |
| OriginalFileName: | NYju.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2200 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4036 | "C:\Users\admin\AppData\Local\Temp\522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe" | C:\Users\admin\AppData\Local\Temp\522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Version: 0.0.0.0 Modules
ims-api(PID) Process(4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe Telegram-Tokens (1)6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M Telegram-Info-Links 6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M Get info about bothttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/getMe Get incoming updateshttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/getUpdates Get webhookhttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/getWebhookInfo Delete webhookhttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/deleteWebhook?drop_pending_updates=true (PID) Process(4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe Telegram-Tokens (1)6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M Telegram-Info-Links 6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M Get info about bothttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/getMe Get incoming updateshttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/getUpdates Get webhookhttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/getWebhookInfo Delete webhookhttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M/deleteWebhook?drop_pending_updates=true Telegram-Requests Token6963761648:AAEL0SFPQj0Q9fEkjK4Z24oZsmsROQs_c4M End-PointsendDocument Args | |||||||||||||||
| 4120 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4800 | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FiWRXehUNDI" /XML "C:\Users\admin\AppData\Local\Temp\tmpF1CD.tmp" | C:\Windows\SysWOW64\schtasks.exe | — | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5432 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6404 | "C:\Users\admin\AppData\Local\Temp\522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe" | C:\Users\admin\AppData\Local\Temp\522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4036) 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6404 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | C:\Users\admin\AppData\Roaming\FiWRXehUNDI.exe | executable | |
MD5:ADE450C7A2B33CA4502E5AADC1CFDFEA | SHA256:522DF31FA6822A48A743918CC4371DAAA6CA5AADE2713DDF6E4A7726C78D54A7 | |||
| 6404 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | C:\Users\admin\AppData\Local\Temp\tmpF1CD.tmp | xml | |
MD5:B8126EA9D548FF66754740EB433258CC | SHA256:89C347E9BCE28BCCF1EC98E18A12521563BC5C7D3840CA1156115393ECF23941 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1468 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | binary | 471 b | whitelisted |
1268 | svchost.exe | GET | 200 | 2.16.164.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 825 b | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | NL | binary | 814 b | whitelisted |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | US | text | 6 b | whitelisted |
1740 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | NL | binary | 419 b | whitelisted |
1740 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | NL | binary | 407 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1636 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1468 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1468 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
1268 | svchost.exe | 2.16.164.112:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
ip-api.com |
| whitelisted |
api.telegram.org |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | A Network Trojan was detected | ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com |
2200 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2200 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
2200 | svchost.exe | Misc activity | SUSPICIOUS [ANY.RUN] Possible sending an external IP address to Telegram |
2200 | svchost.exe | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Misc activity | ET HUNTING Telegram API Certificate Observed |
4036 | 522df31fa6822a48a743918cc4371daaa6ca5aade2713ddf6e4a7726c78d54a7.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Attempt to exfiltrate via Telegram |