File name: | Consignment Notification_ You Have A Package With Us.eml |
Full analysis: | https://app.any.run/tasks/3b4fa571-0f7c-4640-9f69-b6d49a987dfd |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | September 30, 2020, 11:17:21 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | message/rfc822 |
File info: | SMTP mail, ASCII text |
MD5: | 0ECB4FF6AC30A41AD531B39B16DB1453 |
SHA1: | A3E2C06222253D7EB1061FB868742C72F5B7F265 |
SHA256: | 612870E0CF6B573BD69DE0B4DB7A4AF992211832F03AEC0B32418BB9516C0BCD |
SSDEEP: | 6144:QSvbzQoqfBPgpK6uwiQGRfH22xxCXxaeB6HBxxL/+jDkcecYjoVCTbrn1jwJo:ZQnfWTiJ1W+x2gh+wLcYjhTbrd |
.eml | | | E-Mail message (Var. 1) (100) |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2876 | "C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Consignment Notification_ You Have A Package With Us.eml" | C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 14.0.6025.1000 | ||||
908 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\AJGJN1LC\Shipping Document PLBL Draft.r00" | C:\Program Files\WinRAR\WinRAR.exe | OUTLOOK.EXE | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
3204 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa908.084\Shipping Document PL&BL Draft.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa908.084\Shipping Document PL&BL Draft.exe | WinRAR.exe | |
User: admin Company: f}51p%r#67y/:8 Integrity Level: MEDIUM Description: 4d?~6lq)23z, Exit code: 0 Version: 6.8.11.14 | ||||
2568 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa908.084\Shipping Document PL&BL Draft.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa908.084\Shipping Document PL&BL Draft.exe | Shipping Document PL&BL Draft.exe | |
User: admin Company: f}51p%r#67y/:8 Integrity Level: MEDIUM Description: 4d?~6lq)23z, Version: 6.8.11.14 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVR7A99.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\tmp7CCC.tmp | — | |
MD5:— | SHA256:— | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\AJGJN1LC\Shipping Document PLBL Draft (2).r00\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.log | text | |
MD5:E3B6B588D9C0D3D950C9ED549B8E4975 | SHA256:BACCB540B22311541BBFC647A6BB4B39B5E4F3235F330F41F6791FD57A1DD3BE | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6B5113F5.dat | image | |
MD5:01BDE353FDA8913AD71E52A1D31B317E | SHA256:8919FAD48CFD46C02114E8CC563906296CBAFA5F785B0EC9621963FD101533A1 | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | pgc | |
MD5:D8BC8EAAE46F250F9E8A39E6BAD93006 | SHA256:6A9245CFEEEB994485EE3C32C2F4EDB1C165F8303C7AAC51F140D2612024F8EB | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B3FEA172.dat | image | |
MD5:EA69E747B5D2800077F9F7A001E7B449 | SHA256:72158C02209D4AC56F500219A8A93EA6C3C0D8A7187F59194FDD63AC2D2D7E32 | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\AJGJN1LC\Shipping Document PLBL Draft.r00 | compressed | |
MD5:2BFD68A9A4E0B37B988D46FC33FFC7FA | SHA256:A9F7447E1C14F3295125754633C1FBAD5DDC490F5BF60234776AB0BBC11AF671 | |||
908 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa908.084\Shipping Document PL&BL Draft.exe | executable | |
MD5:4868A241678671236CD07A7F93D02A8E | SHA256:32204B5CCC2A9CD9F1938EEDCABD60A3B64D1E6445F1AAE6A3681F0F45459CCD | |||
2876 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\AJGJN1LC\Shipping Document PLBL Draft (2).r00 | compressed | |
MD5:2BFD68A9A4E0B37B988D46FC33FFC7FA | SHA256:A9F7447E1C14F3295125754633C1FBAD5DDC490F5BF60234776AB0BBC11AF671 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2876 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
2568 | Shipping Document PL&BL Draft.exe | 85.187.154.178:587 | mail.flood-protection.org | A2 Hosting, Inc. | US | malicious |
2568 | Shipping Document PL&BL Draft.exe | 54.225.66.103:443 | api.ipify.org | Amazon.com, Inc. | US | shared |
Domain | IP | Reputation |
---|---|---|
config.messenger.msn.com |
| whitelisted |
mail.flood-protection.org |
| malicious |
api.ipify.org |
| shared |
PID | Process | Class | Message |
---|---|---|---|
2568 | Shipping Document PL&BL Draft.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
2568 | Shipping Document PL&BL Draft.exe | A Network Trojan was detected | SPYWARE [PTsecurity] AgentTesla Exfiltration |
2568 | Shipping Document PL&BL Draft.exe | Misc activity | SUSPICIOUS [PTsecurity] ipify.org External IP Check |
2568 | Shipping Document PL&BL Draft.exe | Misc activity | SUSPICIOUS [PTsecurity] ipify.org External IP Check |