File name:

Swift Copy for US$ 17073.36.exe

Full analysis: https://app.any.run/tasks/f14e9337-9c3f-4ee7-a3b2-a9d149ff2822
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: December 02, 2023, 16:53:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
agenttesla
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

86C92625A06644590F8F93F6AA5669DB

SHA1:

ECEAB13AD2B687AF069DD80A60F714DD345D019C

SHA256:

6A1EF6C9C4A269735AD4093D064DD1C673C32BD24EBDCB8DD01C80D9E9E24876

SSDEEP:

24576:YKL1TsvHKuKKK0LZ6J6f3Z1wcy1XsrQLxmI1zdeNVlQXkRrSuVmHgj1cS4GMm1lq:86J6fp1wcy5srQLxmI1zdeNVlQXkRrS1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
    • Drops the executable file immediately after the start

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 2992)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 2992)
    • AGENTTESLA has been detected (YARA)

      • RegSvcs.exe (PID: 2992)
    • Connects to the CnC server

      • RegSvcs.exe (PID: 2992)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
    • Accesses Microsoft Outlook profiles

      • RegSvcs.exe (PID: 2992)
    • Connects to SMTP port

      • RegSvcs.exe (PID: 2992)
  • INFO

    • Checks supported languages

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
      • RegSvcs.exe (PID: 2992)
    • Reads the computer name

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
      • RegSvcs.exe (PID: 2992)
    • Create files in a temporary directory

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
    • Reads the machine GUID from the registry

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
      • RegSvcs.exe (PID: 2992)
    • Creates files or folders in the user directory

      • Swift Copy for US$ 17073.36.exe (PID: 1092)
    • Reads Environment values

      • RegSvcs.exe (PID: 2992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(2992) RegSvcs.exe
Protocolsmtp
Hostmail.iaa-airferight.com
Port25
Usernameadmin@iaa-airferight.com
Password29ftOO+6H-ivsG5A
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:01 03:36:21+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 679936
InitializedDataSize: 11776
UninitializedDataSize: -
EntryPoint: 0xa7f1a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.4.8.3
ProductVersionNumber: 5.4.8.3
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Spoon
CompanyName: Ball
FileDescription: Cup
FileVersion: 5.4.8.3
InternalName: bSLc.exe
LegalCopyright: Dad
LegalTrademarks: Bell
OriginalFileName: bSLc.exe
ProductName: Plate
ProductVersion: 5.4.8.3
AssemblyVersion: 5.4.8.3
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start swift copy for us$ 17073.36.exe no specs schtasks.exe no specs regsvcs.exe no specs #AGENTTESLA regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
1092"C:\Users\admin\AppData\Local\Temp\Swift Copy for US$ 17073.36.exe" C:\Users\admin\AppData\Local\Temp\Swift Copy for US$ 17073.36.exeexplorer.exe
User:
admin
Company:
Ball
Integrity Level:
MEDIUM
Description:
Cup
Exit code:
0
Version:
5.4.8.3
Modules
Images
c:\users\admin\appdata\local\temp\swift copy for us$ 17073.36.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
1176"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dUtDhaePto" /XML "C:\Users\admin\AppData\Local\Temp\tmp6ABA.tmp"C:\Windows\SysWOW64\schtasks.exeSwift Copy for US$ 17073.36.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2028"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSwift Copy for US$ 17073.36.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
4294967295
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2992"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
Swift Copy for US$ 17073.36.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
AgentTesla
(PID) Process(2992) RegSvcs.exe
Protocolsmtp
Hostmail.iaa-airferight.com
Port25
Usernameadmin@iaa-airferight.com
Password29ftOO+6H-ivsG5A
Total events
522
Read events
514
Write events
8
Delete events
0

Modification events

(PID) Process:(1092) Swift Copy for US$ 17073.36.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1092) Swift Copy for US$ 17073.36.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1092) Swift Copy for US$ 17073.36.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1092) Swift Copy for US$ 17073.36.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1092Swift Copy for US$ 17073.36.exeC:\Users\admin\AppData\Local\Temp\tmp6ABA.tmpxml
MD5:C9F814EA4BD5AEBEAFCB9B69D048BB9F
SHA256:CAD8C585309318F083DB20AEE618399DF6E150D31C776847F68F693530F95B78
1092Swift Copy for US$ 17073.36.exeC:\Users\admin\AppData\Roaming\dUtDhaePto.exeexecutable
MD5:86C92625A06644590F8F93F6AA5669DB
SHA256:6A1EF6C9C4A269735AD4093D064DD1C673C32BD24EBDCB8DD01C80D9E9E24876
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2992
RegSvcs.exe
84.54.23.97:25
mail.iaa-airferight.com
Contabo GmbH
US
unknown

DNS requests

Domain
IP
Reputation
mail.iaa-airferight.com
  • 84.54.23.97
malicious

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info