File name: | SUPPLIER_PURCHASE_ORDER.IMG |
Full analysis: | https://app.any.run/tasks/91679b7b-cba2-43a5-981e-f8a7009fd755 |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | February 21, 2020, 19:00:06 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-iso9660-image |
File info: | UDF filesystem data (version 1.5) 'DESKTOP' |
MD5: | 026E3E49B052437059A85EC673C6C494 |
SHA1: | 62D64FEB0C53752326E6171F27444E123EE28768 |
SHA256: | 6342D4838170DDE93F957C39E0DACD2A7761FD3739A89E03CBFCA759878976FB |
SSDEEP: | 49152:6u0c++OCvkGs9FaTOGQymIC6F3+uRcYY:FB3vkJ9TjA3+E |
.iso | | | ISO 9660 CD image (27.6) |
---|---|---|
.atn | | | Photoshop Action (27.1) |
.gmc | | | Game Music Creator Music (6.1) |
VolumeName: | DESKTOP |
---|---|
VolumeBlockCount: | 1086 |
VolumeBlockSize: | 2048 |
RootDirectoryCreateDate: | 2020:02:21 16:50:00+01:00 |
VolumeSetName: | UNDEFINED |
Software: | IMGBURN V2.5.8.0 - THE ULTIMATE IMAGE BURNER! |
VolumeCreateDate: | 2020:02:21 16:50:00.00+01:00 |
VolumeModifyDate: | 2020:02:21 16:50:00.00+01:00 |
VolumeSize: | 2.1 MB |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3744 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SUPPLIER_PURCHASE_ORDER.IMG.iso" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
1920 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3744.13824\Supplier_Purchase_Order.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3744.13824\Supplier_Purchase_Order.exe | — | WinRAR.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2484 | "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\RegSvcs.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Supplier_Purchase_Order.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Version: 4.7.3062.0 built by: NET472REL1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2484 | RegSvcs.exe | C:\Users\admin\AppData\Roaming\h21uzyto.qrh\Chrome\Default\Cookies | — | |
MD5:— | SHA256:— | |||
2484 | RegSvcs.exe | C:\Users\admin\AppData\Roaming\h21uzyto.qrh\Firefox\Profiles\qldyz51w.default\cookies.sqlite | — | |
MD5:— | SHA256:— | |||
2484 | RegSvcs.exe | C:\Users\admin\AppData\Roaming\h21uzyto.qrh.zip | compressed | |
MD5:774C292A2BDE9440A0A456C3BFB08C85 | SHA256:84C38C40E36AB6367AB87972E580A34E0A1B2B2E6A7A7EDBA05F967823D0374B | |||
2484 | RegSvcs.exe | C:\Users\admin\AppData\Local\Temp\077a3c94-3024-497b-9d85-8d823d90b06c | sqlite | |
MD5:0B3C43342CE2A99318AA0FE9E531C57B | SHA256:0CCB4915E00390685621DA3D75EBFD5EDADC94155A79C66415A7F4E9763D71B8 | |||
3744 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3744.13824\Supplier_Purchase_Order.exe | executable | |
MD5:E99E3C581A6B9397188AF9C04A888A63 | SHA256:12FA3CF08E6E22B34015EECB2B580C4553F8B2B90D443DED2AFB225469FE92B9 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2484 | RegSvcs.exe | 110.4.45.37:587 | mail.elkat.com.my | Exa Bytes Network Sdn.Bhd. | MY | suspicious |
Domain | IP | Reputation |
---|---|---|
mail.elkat.com.my |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
2484 | RegSvcs.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
2484 | RegSvcs.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |