| File name: | main.exe |
| Full analysis: | https://app.any.run/tasks/51f85495-4490-4e35-9a22-d0f09eb3d539 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | June 30, 2025, 21:46:47 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 7 sections |
| MD5: | C942A56638772644D847709D906FA23D |
| SHA1: | 12D6B77FEC2244CDC4050A083AA741185CC48010 |
| SHA256: | 56A28391D309102557FCF9BC34351A50B49054282F2007851DCBC4E825E7C37A |
| SSDEEP: | 98304:R/0Cg6brcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHFD:ivfkEwE1MUQ881mw02/ki+BIsG |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:06:19 18:59:12+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.43 |
| CodeSize: | 178688 |
| InitializedDataSize: | 154624 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc380 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1052 | mshta.exe bestdreamchaningwithbetterpower.hta | C:\Windows\System32\mshta.exe | — | main.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1068 | "C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\AppData\Local\Temp\3582-490\quasarat.exe" | C:\Users\admin\AppData\Roaming\Axam.exe | quasarat.exe | ||||||||||||
User: admin Integrity Level: HIGH Version: 1.00 Modules
| |||||||||||||||
| 1100 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | main.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1164 | catqw.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | catqw.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft .NET Services Installation Utility Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 1180 | mshta.exe weneedgreatattitudewithbestthinkingsforme.hta | C:\Windows\System32\mshta.exe | — | main.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1192 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1468 | mshta.exe supergoodthingswithbestfriendthingsbetterforme.hta | C:\Windows\System32\mshta.exe | — | main.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1520 | "C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\AppData\Roaming\4rpscvg5.ler0.exe" | C:\Users\admin\AppData\Roaming\Axam.exe | powershell.exe | ||||||||||||
User: admin Integrity Level: HIGH Version: 1.00 Modules
| |||||||||||||||
| 1612 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1636 | "ipconfig" /flushdns | C:\Windows\System32\ipconfig.exe | — | Vb5HUIU.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: IP Configuration Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090230 |
| Operation: | write | Name: | VirtualDesktop |
Value: 10000000303044563096AFED4A643448A750FA41CFC7F708 | |||
| (PID) Process: | (3820) Taskmgr.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager |
| Operation: | delete value | Name: | Preferences |
Value: | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000001102BA |
| Operation: | write | Name: | VirtualDesktop |
Value: 10000000303044563096AFED4A643448A750FA41CFC7F708 | |||
| (PID) Process: | (2388) sFFG7Wg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2388) sFFG7Wg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2388) sFFG7Wg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value: 00000000000000000000000000000000030001000100010013000000000000002C000000000000003A003A007B00360034003500460046003000340030002D0035003000380031002D0031003000310042002D0039004600300038002D003000300041004100300030003200460039003500340045007D003E002000200000001000000000000000430043006C00650061006E00650072002E006C006E006B003E0020007C0000001500000000000000410064006F006200650020004100630072006F006200610074002E006C006E006B003E0020007C0000001A00000000000000640065006D0061006E00640064006900730074007200690062007500740069006F006E002E0070006E0067003E002000200000000F00000000000000460069007200650066006F0078002E006C006E006B003E0020007C000000150000000000000047006F006F0067006C00650020004300680072006F006D0065002E006C006E006B003E0020007C000000180000000000000056004C00430020006D006500640069006100200070006C0061007900650072002E006C006E006B003E0020007C00000016000000000000004D006900630072006F0073006F0066007400200045006400670065002E006C006E006B003E0020007C0000001100000000000000620065006C006F00770072006F00610064002E006A00700067003E002000200000001300000000000000630061006D006500720061006E0061006B00650064002E007200740066003E0020002000000014000000000000006C0069007300740069006E006700610072006500610073002E007200740066003E0020002000000018000000000000006F0072006900670069006E0061006C0070006F0073006900740069006F006E002E007200740066003E002000200000001600000000000000700072006500730065006E0074006100620069006C006900740079002E007200740066003E0020002000000016000000000000007000720069006E0074006500720066006F00720077006100720064002E007200740066003E0020002000000018000000000000007200650063006F006D006D0065006E00640065006400700061007000650072002E007200740066003E002000200000001B00000000000000720065006C006100740069006F006E00730068006900700070006C00610079006500720073002E007200740066003E002000200000001700000000000000720065006D006F007400650069006E0074006500720066006100630065002E0070006E0067003E002000200000000C000000000000006D00610069006E002E006500780065003E00200020000000050000000000000061003E005C002000000001000000000000000200010000000000000000000100000000000000020001000000000000000000110000000600000001000000130000000000000000004040000000001200000000000000000000000000803F0000004008000000803F000040400900000000000000404003000000803F000080400A000000803F0000A0400B0000000040000000000C00000000400000803F0D0000000040000000400E0000000040000040400F0000000040000080401000000000000000803F01000000000000000040020000000000000080400400000000000000A04005000000803F0000000006000000803F0000803F0700000000400000A0401100 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000801F4 |
| Operation: | write | Name: | VirtualDesktop |
Value: 10000000303044563096AFED4A643448A750FA41CFC7F708 | |||
| (PID) Process: | (4772) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000801F4 |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_bz2.pyd | executable | |
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB | SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_asyncio.pyd | executable | |
MD5:56F958EEBBC62305B4BF690D61C78E28 | SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31 | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\VCRUNTIME140.dll | executable | |
MD5:32DA96115C9D783A0769312C0482A62D | SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-console-l1-1-0.dll | executable | |
MD5:FC009A82F0FAB71E2C8ADF7F60F489C8 | SHA256:D2ADD358A45999E95F67D923F1B4F5A27F5A1A895225121909D716EDF5AE13E7 | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-fibers-l1-1-0.dll | executable | |
MD5:774133EFCABBCDD10DF784BB26804290 | SHA256:B82B2D8E62011F2530F9B3FDEC55CF2869E4FB4133BDB6238BC0EA23FAE72661 | |||
| 4772 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_overlapped.pyd | executable | |
MD5:363409FBACB1867F2CE45E3C6922DDB4 | SHA256:F154AC9D5CA0646D18F6197C0406F7541B6E0752B2D82A330036C1E39D3A49E7 | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_cffi_backend.cp313-win_amd64.pyd | executable | |
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26 | SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85 | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_lzma.pyd | executable | |
MD5:D63E2E743EA103626D33B3C1D882F419 | SHA256:7C2D2030D5D246739C5D85F087FCF404BC36E1815E69A8AC7C9541267734FC28 | |||
| 2076 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_decimal.pyd | executable | |
MD5:21FCB8E3D4310346A5DC1A216E7E23CA | SHA256:9A0E05274CAD8D90F6BA6BC594261B36BFBDDF4F5CA6846B6367FE6A4E2FDCE4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3788 | main.exe | GET | 200 | 172.245.95.29:80 | http://172.245.95.29/86/weseethebestthingswithbetterfuturegoodfor.hta | unknown | — | — | malicious |
3788 | main.exe | GET | — | 185.156.72.61:80 | http://185.156.72.61/inc/miromangos.exe | unknown | — | — | malicious |
3788 | main.exe | GET | — | 185.156.72.2:80 | http://185.156.72.2/files/978980897/Vb5HUIU.exe | unknown | — | — | unknown |
3788 | main.exe | GET | 200 | 107.173.9.87:80 | http://107.173.9.87/90/weneedgreatattitudewithbestthinkingsforme.hta | unknown | — | — | malicious |
3788 | main.exe | GET | 200 | 8.137.98.198:8082 | http://8.137.98.198:8082/02.08.2022.exe | unknown | — | — | unknown |
3788 | main.exe | GET | 200 | 47.122.1.243:8000 | http://47.122.1.243:8000/02.08.2022.exe | unknown | — | — | unknown |
3788 | main.exe | GET | — | 185.156.72.2:80 | http://185.156.72.2/files/6053747383/O1sOUoo.exe | unknown | — | — | unknown |
3788 | main.exe | GET | 200 | 109.120.137.172:80 | http://109.120.137.172/Crypt.exe | unknown | — | — | unknown |
3788 | main.exe | GET | — | 185.156.72.2:80 | http://185.156.72.2/files/8052963817/ku56mNL.exe | unknown | — | — | unknown |
3788 | main.exe | GET | — | 185.156.72.2:80 | http://185.156.72.2/files/6299414420/sFFG7Wg.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3688 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3788 | main.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | whitelisted |
3788 | main.exe | 66.63.187.170:80 | — | QUADRANET-INTERNET-SERVICES | US | unknown |
3788 | main.exe | 185.156.72.2:80 | — | Tov Vaiz Partner | RU | unknown |
3788 | main.exe | 77.90.153.74:80 | — | K&K Kommunikationssysteme GmbH | GB | unknown |
3788 | main.exe | 107.173.9.87:80 | — | AS-COLOCROSSING | US | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
pub-75d9e09aa5304a0f9b7cd6c04c01b53e.r2.dev |
| unknown |
hbws.cc |
| unknown |
file.tuff.cat |
| unknown |
cptchvrf.com |
| unknown |
github.com |
| whitelisted |
bitbucket.org |
| whitelisted |
raw.githubusercontent.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3788 | main.exe | Misc activity | ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI |
2200 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] CloudFlare Public R2.dev Bucket |
3788 | main.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
3788 | main.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2200 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .cc TLD |
3788 | main.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 60 |
2200 | svchost.exe | A Network Trojan was detected | ET INFO Observed DNS Query to Cloudflare R2 Public Bucket (r2 .dev) Domain |
3788 | main.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 36 |
3788 | main.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
3788 | main.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 8 |