File name:

36d948b545a839e073e4385095ccff42.exe

Full analysis: https://app.any.run/tasks/1dd12fc4-fd55-4091-9e68-c2d4bf852a74
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: December 02, 2023, 16:53:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
agenttesla
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

36D948B545A839E073E4385095CCFF42

SHA1:

5DC6D5E0D2EB725656DC180EDECAA499B7BE2348

SHA256:

6CCDCFCAD42B18C4EF436F7B0968EF7D74C974F653987806636F448497DF80B2

SSDEEP:

24576:NeJZf3Z1w2YWHI5sGvW+tDMoEaF4RcAJl6STuVD61triwAYcoO3M3jJTYfdpEXTf:NeJZfp1w2YWHI5sGvW+tDMoEaF4RcAJ9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AGENTTESLA has been detected (YARA)

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Drops the executable file immediately after the start

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Steals credentials from Web Browsers

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • AGENTTESLA has been detected (SURICATA)

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Actions looks like stealing of personal data

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
  • SUSPICIOUS

    • Application launched itself

      • 36d948b545a839e073e4385095ccff42.exe (PID: 796)
    • Reads the Internet Settings

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Connects to FTP

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Connects to unusual port

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Accesses Microsoft Outlook profiles

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
  • INFO

    • Reads the machine GUID from the registry

      • 36d948b545a839e073e4385095ccff42.exe (PID: 796)
      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Checks supported languages

      • 36d948b545a839e073e4385095ccff42.exe (PID: 796)
      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Reads the computer name

      • 36d948b545a839e073e4385095ccff42.exe (PID: 796)
      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Reads Environment values

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
    • Creates files or folders in the user directory

      • 36d948b545a839e073e4385095ccff42.exe (PID: 2708)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:01 02:37:40+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 686080
InitializedDataSize: 11776
UninitializedDataSize: -
EntryPoint: 0xa972e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.4.3.2
ProductVersionNumber: 4.4.3.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Linq DB
CompanyName: CSULB
FileDescription: LinqDB
FileVersion: 4.4.3.2
InternalName: nYGV.exe
LegalCopyright: 2023 © CSULB
LegalTrademarks: -
OriginalFileName: nYGV.exe
ProductName: Linq DB
ProductVersion: 4.4.3.2
AssemblyVersion: 4.4.3.3
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 36d948b545a839e073e4385095ccff42.exe no specs #AGENTTESLA 36d948b545a839e073e4385095ccff42.exe

Process information

PID
CMD
Path
Indicators
Parent process
796"C:\Users\admin\AppData\Local\Temp\36d948b545a839e073e4385095ccff42.exe" C:\Users\admin\AppData\Local\Temp\36d948b545a839e073e4385095ccff42.exeexplorer.exe
User:
admin
Company:
CSULB
Integrity Level:
MEDIUM
Description:
LinqDB
Exit code:
0
Version:
4.4.3.2
Modules
Images
c:\users\admin\appdata\local\temp\36d948b545a839e073e4385095ccff42.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
2708"C:\Users\admin\AppData\Local\Temp\36d948b545a839e073e4385095ccff42.exe"C:\Users\admin\AppData\Local\Temp\36d948b545a839e073e4385095ccff42.exe
36d948b545a839e073e4385095ccff42.exe
User:
admin
Company:
CSULB
Integrity Level:
MEDIUM
Description:
LinqDB
Exit code:
0
Version:
4.4.3.2
Modules
Images
c:\users\admin\appdata\local\temp\36d948b545a839e073e4385095ccff42.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
Total events
456
Read events
456
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
270836d948b545a839e073e4385095ccff42.exeC:\Users\admin\AppData\Roaming\yccfDcq\yccfDcq.exeexecutable
MD5:36D948B545A839E073E4385095CCFF42
SHA256:6CCDCFCAD42B18C4EF436F7B0968EF7D74C974F653987806636F448497DF80B2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
4
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2708
36d948b545a839e073e4385095ccff42.exe
64.185.227.156:443
api.ipify.org
WEBNX
US
unknown
2708
36d948b545a839e073e4385095ccff42.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
2708
36d948b545a839e073e4385095ccff42.exe
190.107.177.239:21
valvulasthermovalve.cl
SOC. COMERCIAL WIRENET CHILE LTDA.
CL
unknown
2708
36d948b545a839e073e4385095ccff42.exe
190.107.177.239:60548
valvulasthermovalve.cl
SOC. COMERCIAL WIRENET CHILE LTDA.
CL
unknown

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 64.185.227.156
  • 104.237.62.212
  • 173.231.16.77
shared
ip-api.com
  • 208.95.112.1
shared
dns.msftncsi.com
  • 131.107.255.255
shared
valvulasthermovalve.cl
  • 190.107.177.239
unknown

Threats

PID
Process
Class
Message
324
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2708
36d948b545a839e073e4385095ccff42.exe
A Network Trojan was detected
ET MALWARE AgentTesla Exfil via FTP
No debug info