File name:

Win32.AgentTesla.exe

Full analysis: https://app.any.run/tasks/efe56980-a092-4a61-83da-1abc69a5deaa
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 31, 2025, 01:32:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
agenttesla
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

2B294B3499D1CCE794BADFFC959B7618

SHA1:

9AA826795798948E8058E3FF1342D81D5D8EE4FA

SHA256:

699EC052ECC898BDBDAFEA0027C4AB44C3D01AE011C17745DD2B7FBDDAA077F3

SSDEEP:

12288:5qIrEFD09leQEA49darfr3/2AbitnVYE96ltRH:5AFD1A498H2Dm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AGENTTESLA has been detected (YARA)

      • Win32.AgentTesla.exe (PID: 3500)
    • Changes the autorun value in the registry

      • xws.exe (PID: 568)
      • Win32.AgentTesla.exe (PID: 2444)
    • Steals credentials from Web Browsers

      • xws.exe (PID: 2228)
    • Actions looks like stealing of personal data

      • xws.exe (PID: 2228)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Win32.AgentTesla.exe (PID: 2444)
      • xws.exe (PID: 2228)
    • Application launched itself

      • Win32.AgentTesla.exe (PID: 2444)
      • xws.exe (PID: 568)
    • Reads the Internet Settings

      • Win32.AgentTesla.exe (PID: 3500)
      • sipnotify.exe (PID: 1816)
      • eventvwr.exe (PID: 2548)
      • xws.exe (PID: 2228)
      • powershell.exe (PID: 2580)
      • powershell.exe (PID: 3248)
      • eventvwr.exe (PID: 2772)
    • Checks for external IP

      • svchost.exe (PID: 1080)
      • xws.exe (PID: 2228)
      • svchost.exe (PID: 1116)
      • Win32.AgentTesla.exe (PID: 3500)
    • Reads security settings of Internet Explorer

      • Win32.AgentTesla.exe (PID: 3500)
      • xws.exe (PID: 2228)
    • Starts POWERSHELL.EXE for commands execution

      • eventvwr.exe (PID: 2772)
      • eventvwr.exe (PID: 2548)
    • Starts process via Powershell

      • powershell.exe (PID: 3248)
      • powershell.exe (PID: 2580)
    • The system shut down or reboot

      • Win32.AgentTesla.exe (PID: 3500)
      • xws.exe (PID: 2228)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 1700)
      • sipnotify.exe (PID: 1816)
    • Loads DLL from Mozilla Firefox

      • xws.exe (PID: 2228)
    • Accesses Microsoft Outlook profiles

      • xws.exe (PID: 2228)
  • INFO

    • Reads the computer name

      • Win32.AgentTesla.exe (PID: 3500)
      • Win32.AgentTesla.exe (PID: 2444)
      • Win32.AgentTesla.exe (PID: 3628)
      • IMEKLMG.EXE (PID: 1508)
      • IMEKLMG.EXE (PID: 568)
      • xws.exe (PID: 568)
      • xws.exe (PID: 2228)
      • xws.exe (PID: 2792)
      • Z09.exe (PID: 2952)
    • Checks supported languages

      • Win32.AgentTesla.exe (PID: 3500)
      • Win32.AgentTesla.exe (PID: 2444)
      • Win32.AgentTesla.exe (PID: 3628)
      • IMEKLMG.EXE (PID: 568)
      • xws.exe (PID: 568)
      • xws.exe (PID: 2228)
      • IMEKLMG.EXE (PID: 1508)
      • xws.exe (PID: 2792)
      • Z09.exe (PID: 2952)
    • Create files in a temporary directory

      • Win32.AgentTesla.exe (PID: 2444)
      • xws.exe (PID: 2228)
    • Reads the machine GUID from the registry

      • Win32.AgentTesla.exe (PID: 2444)
      • Win32.AgentTesla.exe (PID: 3500)
      • Win32.AgentTesla.exe (PID: 3628)
      • xws.exe (PID: 568)
      • xws.exe (PID: 2228)
      • xws.exe (PID: 2792)
      • Z09.exe (PID: 2952)
    • Reads Windows Product ID

      • Win32.AgentTesla.exe (PID: 3500)
      • xws.exe (PID: 2228)
    • Disables trace logs

      • Win32.AgentTesla.exe (PID: 3500)
      • xws.exe (PID: 2228)
    • Reads security settings of Internet Explorer

      • eventvwr.exe (PID: 2772)
      • eventvwr.exe (PID: 2548)
    • Process checks whether UAC notifications are on

      • Win32.AgentTesla.exe (PID: 3500)
      • IMEKLMG.EXE (PID: 1508)
      • IMEKLMG.EXE (PID: 568)
      • xws.exe (PID: 2228)
    • Reads Environment values

      • Win32.AgentTesla.exe (PID: 3500)
      • xws.exe (PID: 2228)
    • The executable file from the user directory is run by the Powershell process

      • Win32.AgentTesla.exe (PID: 3628)
      • xws.exe (PID: 2792)
    • Manual execution by a user

      • IMEKLMG.EXE (PID: 1508)
      • IMEKLMG.EXE (PID: 568)
      • xws.exe (PID: 568)
    • Launch of the file from Registry key

      • xws.exe (PID: 568)
      • Win32.AgentTesla.exe (PID: 2444)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:01:16 08:15:19+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 435200
InitializedDataSize: 25088
UninitializedDataSize: -
EntryPoint: 0x6c2ce
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.9.1.5
ProductVersionNumber: 6.9.1.5
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Comverse Technology Kopl
CompanyName: Comverse Technology
FileDescription: Comverse Technology
FileVersion: 6.9.1.5
InternalName: Po160118.exe
LegalCopyright: (c) 2015Comverse Technology
OriginalFileName: Po160118.exe
ProductName: Comverse Technology Cemp Kopl
ProductVersion: 6.9.1.5
AssemblyVersion: 17.18.7.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
106
Monitored processes
21
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start win32.agenttesla.exe #AGENTTESLA win32.agenttesla.exe svchost.exe eventvwr.exe no specs eventvwr.exe powershell.exe no specs win32.agenttesla.exe no specs shutdown.exe no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs xws.exe xws.exe eventvwr.exe no specs svchost.exe eventvwr.exe powershell.exe no specs xws.exe no specs shutdown.exe no specs z09.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
568"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
568"C:\Users\admin\AppData\Local\Temp\xws\xws.exe" C:\Users\admin\AppData\Local\Temp\xws\xws.exe
explorer.exe
User:
admin
Company:
Comverse Technology
Integrity Level:
MEDIUM
Description:
Comverse Technology
Exit code:
0
Version:
6.9.1.5
Modules
Images
c:\users\admin\appdata\local\temp\xws\xws.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1116C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1508"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
1700C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1816C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2228"C:\Users\admin\AppData\Local\Temp\xws\xws.exe"C:\Users\admin\AppData\Local\Temp\xws\xws.exe
xws.exe
User:
admin
Company:
Comverse Technology
Integrity Level:
MEDIUM
Description:
Comverse Technology
Version:
6.9.1.5
Modules
Images
c:\users\admin\appdata\local\temp\xws\xws.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2380"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exexws.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Event Viewer Snapin Launcher
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\eventvwr.exe
c:\windows\system32\ntdll.dll
2444"C:\Users\admin\AppData\Local\Temp\Win32.AgentTesla.exe" C:\Users\admin\AppData\Local\Temp\Win32.AgentTesla.exe
explorer.exe
User:
admin
Company:
Comverse Technology
Integrity Level:
MEDIUM
Description:
Comverse Technology
Exit code:
0
Version:
6.9.1.5
Modules
Images
c:\users\admin\appdata\local\temp\win32.agenttesla.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
9 319
Read events
9 218
Write events
92
Delete events
9

Modification events

(PID) Process:(2444) Win32.AgentTesla.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:xws
Value:
C:\Users\admin\AppData\Local\Temp\xws\xws.exe
(PID) Process:(1080) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
D4DA6DA8B86C
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3500) Win32.AgentTesla.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Win32_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
8
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
1116svchost.exeC:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb
MD5:
SHA256:
1816sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\en-us.htmlhtml
MD5:5001C5247AF7E35AC35ACE61B87E8040
SHA256:2920ED0DDFE475884703A5AE7B835F40398E509AA26B52A8DDD7F25DCD4B3D2E
1816sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\default.cabcompressed
MD5:340674F6A3D1562E28A011EC11E40D83
SHA256:259880E2346D986ABEED46AA9C2917C53E969AAE6927F2CA0A2AD0967736DF98
2580powershell.exeC:\Users\admin\AppData\Local\Temp\tcb1xe0u.3qp.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1116svchost.exeC:\Windows\System32\catroot2\edb.logbinary
MD5:ABCFF206506FFE07C82C5CFFB140F8A0
SHA256:E315EEC159A24C13B398046AB339605B59390CC1AC9A941797E15AA91D8E171F
1816sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\styles.csstext
MD5:3383EEF350240253D7C2C2564381B3CB
SHA256:85443493D86D6D7FB0E07BC9705DFC9C858086FBA1B0E508092AB328D5F145E8
2228xws.exeC:\Users\admin\AppData\Local\Temp\Z09.exeexecutable
MD5:AA5E9AF3F263B96805F14058605F21E9
SHA256:19FED10083A7B48930E5A4CAAB964B445A58FFE14D98B206FA96CCD7D928AE61
1816sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\microsoft-logo.pngimage
MD5:B7C73A0CFBA68CC70C35EF9C63703CE4
SHA256:1D8B27A0266FF526CF95447F3701592A908848467D37C09A00A2516C1F29A013
3248powershell.exeC:\Users\admin\AppData\Local\Temp\oslptgmc.w1i.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
1816sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\main.jpgimage
MD5:C8BCC2041232DA45C1367F1FEED51370
SHA256:C0EC6771F923E7B85F6E2E7AA58D6BA51D322E78F53CEE8108DBBFD352BE7B25
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
14
DNS requests
4
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1816
sipnotify.exe
HEAD
503
104.102.43.250:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133931323739840000
unknown
whitelisted
2228
xws.exe
GET
200
193.122.130.0:80
http://checkip.dyndns.org/
unknown
whitelisted
3500
Win32.AgentTesla.exe
GET
200
193.122.130.0:80
http://checkip.dyndns.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3500
Win32.AgentTesla.exe
193.122.130.0:80
checkip.dyndns.org
ORACLE-BMC-31898
US
whitelisted
1116
svchost.exe
224.0.0.252:5355
whitelisted
1816
sipnotify.exe
104.102.43.250:80
query.prod.cms.rt.microsoft.com
AKAMAI-AS
DE
whitelisted
2228
xws.exe
193.122.130.0:80
checkip.dyndns.org
ORACLE-BMC-31898
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
checkip.dyndns.org
  • 193.122.130.0
  • 193.122.6.168
  • 132.226.8.169
  • 132.226.247.73
  • 158.101.44.242
whitelisted
query.prod.cms.rt.microsoft.com
  • 104.102.43.250
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
3500
Win32.AgentTesla.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
1116
svchost.exe
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
2228
xws.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
No debug info