analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

P.O098677.r00

Full analysis: https://app.any.run/tasks/71950ff2-d637-4260-8526-8618c05cbcb9
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: March 31, 2020, 08:19:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
agenttesla
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

36FE6EC8809F8BF7E8EB76D7F1410028

SHA1:

5590348F838EFD371EF9D4531414B1F3A71F5F5A

SHA256:

5C6C5B6ADFFEC901B8F82E30D5D12BE74405D62CCCA5203976A6143068B1E5E1

SSDEEP:

6144:sPG2Gud5iwsEuylLW1L8XscKRsmE2ZGS+zdnZCzqwrNE1uJkBzoHpPjsTrF/gYJ4:squGyWAsnEGGSknAGqEmOUjKlVErVlj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • P.O098677.exe (PID: 1920)
      • P.O098677.exe (PID: 3028)
      • P.O098677.exe (PID: 1756)
    • AGENTTESLA was detected

      • P.O098677.exe (PID: 1756)
    • Actions looks like stealing of personal data

      • P.O098677.exe (PID: 1756)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3000)
    • Application launched itself

      • P.O098677.exe (PID: 1920)
    • Reads Environment values

      • P.O098677.exe (PID: 1756)
    • Connects to SMTP port

      • P.O098677.exe (PID: 1756)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe p.o098677.exe no specs p.o098677.exe no specs #AGENTTESLA p.o098677.exe

Process information

PID
CMD
Path
Indicators
Parent process
3000"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\P.O098677.r00"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1920"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.14246\P.O098677.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.14246\P.O098677.exeWinRAR.exe
User:
admin
Company:
fR-45gM+$E8cNn=
Integrity Level:
MEDIUM
Description:
nL}79=bCqM-8$a2PB4
Exit code:
0
Version:
1.2.2.3
3028"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.15894\P.O098677.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.15894\P.O098677.exeWinRAR.exe
User:
admin
Company:
fR-45gM+$E8cNn=
Integrity Level:
MEDIUM
Description:
nL}79=bCqM-8$a2PB4
Exit code:
0
Version:
1.2.2.3
1756"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.14246\P.O098677.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.14246\P.O098677.exe
P.O098677.exe
User:
admin
Company:
fR-45gM+$E8cNn=
Integrity Level:
MEDIUM
Description:
nL}79=bCqM-8$a2PB4
Version:
1.2.2.3
Total events
485
Read events
473
Write events
12
Delete events
0

Modification events

(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3000) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\P.O098677.r00
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3000WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3000.14246\P.O098677.exeexecutable
MD5:13E47130305BCFC8FF10602F65B38586
SHA256:9CEA35239D421BF3E721EF3AF7FF3306FF04E13225D8194547A9DDDAB3607D4D
3000WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3000.15894\P.O098677.exeexecutable
MD5:13E47130305BCFC8FF10602F65B38586
SHA256:9CEA35239D421BF3E721EF3AF7FF3306FF04E13225D8194547A9DDDAB3607D4D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1756
P.O098677.exe
160.153.133.86:587
mail.edifler.xyz
GoDaddy.com, LLC
US
malicious

DNS requests

Domain
IP
Reputation
mail.edifler.xyz
  • 160.153.133.86
malicious

Threats

PID
Process
Class
Message
1756
P.O098677.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
1756
P.O098677.exe
A Network Trojan was detected
SPYWARE [PTsecurity] AgentTesla Exfiltration
No debug info