File name:

mim.exe

Full analysis: https://app.any.run/tasks/c7ed585e-c8cf-474c-b5d1-9217a4b736f2
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: February 06, 2025, 11:43:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
agenttesla
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

8BABCABCCF03A8FDC599FEACA14B0A7B

SHA1:

5DFA5AE463CD11EAA86B00CF7E2CE6C1F85FBA95

SHA256:

595D3B670B05D0E45B48B7F6EEA396AD268A02F42C80AE20CBE7CD02890E05BD

SSDEEP:

49152:Z6WNkebmEFhOHGo4uh68QqyxBXSCXPGms1lw3F0YmKDSd0ujsE58Vq84wE8hnHkI:s4kEm2O0uh68QqoBXSCXPGms1lw3F0YE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 6348)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 6348)
    • AGENTTESLA has been detected (YARA)

      • RegSvcs.exe (PID: 6348)
  • SUSPICIOUS

    • Connects to SMTP port

      • RegSvcs.exe (PID: 6348)
  • INFO

    • Checks supported languages

      • mim.exe (PID: 6304)
      • RegSvcs.exe (PID: 6348)
    • The sample compiled with english language support

      • mim.exe (PID: 6304)
    • Reads mouse settings

      • mim.exe (PID: 6304)
    • Create files in a temporary directory

      • mim.exe (PID: 6304)
    • Reads the computer name

      • RegSvcs.exe (PID: 6348)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6348)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 6348)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(6348) RegSvcs.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
Usernamejoko.wahyono@pgsu.co.id
PasswordVecls16@Vezs
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:02:06 00:37:32+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581632
InitializedDataSize: 510976
UninitializedDataSize: -
EntryPoint: 0x2800a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
120
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mim.exe no specs #AGENTTESLA regsvcs.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6304"C:\Users\admin\Desktop\mim.exe" C:\Users\admin\Desktop\mim.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\mim.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6348"C:\Users\admin\Desktop\mim.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
mim.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
AgentTesla
(PID) Process(6348) RegSvcs.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
Usernamejoko.wahyono@pgsu.co.id
PasswordVecls16@Vezs
Total events
1 051
Read events
1 051
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6304mim.exeC:\Users\admin\AppData\Local\Temp\aut6B40.tmpbinary
MD5:C6AF4C6342CB0BF81C14716E24AD3D90
SHA256:D4C63F32F67C343D8C4ADA2D03C9F883778936CB36170F763FCF2B878870271D
6304mim.exeC:\Users\admin\AppData\Local\Temp\nonsubmergedbinary
MD5:BFE5D7CF44DEA9E502A56705B570EA92
SHA256:A277F6FDEE0EE8E3325D25AC89976A7552D8D7DA926E8DF82E342764F0D23B17
6304mim.exeC:\Users\admin\AppData\Local\Temp\subpredicationtext
MD5:9DAD87F23234789CEADF210208827F3A
SHA256:245FAC96FAD727CA498F715387916D817BA37D1B2EC37DF58E6234EA29BB6DE4
6304mim.exeC:\Users\admin\AppData\Local\Temp\aut6F1A.tmpbinary
MD5:D73DAE5BB68F745906FBDF5CC02EFA6B
SHA256:77DA5304DDDEC184FCA26DFE7008AA5F8B12A333656818150211DCDC848771BD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
17
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
716
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6348
RegSvcs.exe
107.178.108.41:587
mail.pgsu.co.id
IOFLOOD
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.14
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
mail.pgsu.co.id
  • 107.178.108.41
malicious
self.events.data.microsoft.com
  • 20.189.173.14
whitelisted

Threats

No threats detected
No debug info