File name: | PAYMENT_RECEIPT.zip |
Full analysis: | https://app.any.run/tasks/29316c2f-4013-45b2-966c-74b14ca4275b |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | July 13, 2020, 02:56:55 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | CB5DC75619E5AC6CC96D1C4E27E7F328 |
SHA1: | BD5CD609B79A5F6A32A284B7FE1720AAC42A91B3 |
SHA256: | 536A36B05B2B18DF1476383C82B378BA559CBF16F7DF47C90DFB3D84A780751F |
SSDEEP: | 12288:5lWJccNRJR2O/TixuzTpvjqmDoav1LGi5:5l4Z7wArJ34e |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | PAYMENT RECEIPT.exe |
---|---|
ZipUncompressedSize: | 453632 |
ZipCompressedSize: | 403072 |
ZipCRC: | 0xd411b6fe |
ZipModifyDate: | 2020:02:11 05:48:08 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2908 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PAYMENT_RECEIPT.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
2556 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2908.42576\PAYMENT RECEIPT.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2908.42576\PAYMENT RECEIPT.exe | WinRAR.exe | |
User: admin Company: Scripted Nulls Integrity Level: MEDIUM Description: TournamentState Exit code: 0 Version: 6.4.0.1 | ||||
3064 | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UpeRtYs" /XML "C:\Users\admin\AppData\Local\Temp\tmp98DD.tmp" | C:\Windows\System32\schtasks.exe | — | PAYMENT RECEIPT.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3832 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2908.42576\PAYMENT RECEIPT.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2908.42576\PAYMENT RECEIPT.exe | PAYMENT RECEIPT.exe | |
User: admin Company: Scripted Nulls Integrity Level: MEDIUM Description: TournamentState Version: 6.4.0.1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2556 | PAYMENT RECEIPT.exe | C:\Users\admin\AppData\Local\Temp\tmp98DD.tmp | xml | |
MD5:392C227F79D5631E61C042DAD407EF86 | SHA256:7323EF1DC8BB6175947C1E6343418338E66AE8EE3113E5AF07A719EEA7D6A3A2 | |||
3832 | PAYMENT RECEIPT.exe | C:\Users\admin\AppData\Local\Temp\b7e39d8b-c7bc-460d-b73c-38d62438f543 | sqlite | |
MD5:0B3C43342CE2A99318AA0FE9E531C57B | SHA256:0CCB4915E00390685621DA3D75EBFD5EDADC94155A79C66415A7F4E9763D71B8 | |||
2908 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa2908.42576\PAYMENT RECEIPT.exe | executable | |
MD5:C0BB718167B4726FCDE23E30FBDB3320 | SHA256:4D9C21FFBDA7E98665904F5225B18C18189DD6AFD332CDF65C0B40A503E74375 | |||
3832 | PAYMENT RECEIPT.exe | C:\Users\admin\AppData\Roaming\GkLGAoQ\LHjqA.exe | executable | |
MD5:C0BB718167B4726FCDE23E30FBDB3320 | SHA256:4D9C21FFBDA7E98665904F5225B18C18189DD6AFD332CDF65C0B40A503E74375 | |||
2556 | PAYMENT RECEIPT.exe | C:\Users\admin\AppData\Roaming\UpeRtYs.exe | executable | |
MD5:C0BB718167B4726FCDE23E30FBDB3320 | SHA256:4D9C21FFBDA7E98665904F5225B18C18189DD6AFD332CDF65C0B40A503E74375 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3832 | PAYMENT RECEIPT.exe | 162.241.30.77:587 | mail.seabeachaquaparkssh.com | CyrusOne LLC | US | malicious |
Domain | IP | Reputation |
---|---|---|
mail.seabeachaquaparkssh.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
3832 | PAYMENT RECEIPT.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |