File name:

72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779

Full analysis: https://app.any.run/tasks/f218abb6-b50f-402c-9a73-39b45a8278d0
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: January 10, 2025, 22:03:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
exfiltration
smtp
agenttesla
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

45AF51C7C9F455CB7ECBC601FDB6A7AE

SHA1:

D8A37FF0C1F3079AF23010DB6E0FF46390F5DA21

SHA256:

72A1BA2AAF8D724372E2592797580D085F48CCDCC9F3985EB01B108A49FE5779

SSDEEP:

49152:BHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZm:OAGQX21RBt7QjTmcaTH/vU4do9Pcjq1T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AGENTTESLA has been detected (YARA)

      • RegSvcs.exe (PID: 6260)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 6260)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 6260)
  • SUSPICIOUS

    • Connects to SMTP port

      • RegSvcs.exe (PID: 6260)
    • The process connected to a server suspected of theft

      • RegSvcs.exe (PID: 6260)
  • INFO

    • Reads mouse settings

      • 72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe (PID: 6232)
    • The sample compiled with english language support

      • 72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe (PID: 6232)
    • Create files in a temporary directory

      • 72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe (PID: 6232)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 6260)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6260)
    • Reads the computer name

      • RegSvcs.exe (PID: 6260)
    • Checks supported languages

      • 72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe (PID: 6232)
      • RegSvcs.exe (PID: 6260)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(6260) RegSvcs.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
PasswordVecls16@Vezs
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

CharacterSet: Unicode
LanguageCode: English (British)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x27dcd
UninitializedDataSize: -
InitializedDataSize: 539136
CodeSize: 581120
LinkerVersion: 12
PEType: PE32
ImageFileCharacteristics: Executable, Large address aware, 32-bit
TimeStamp: 2024:12:13 06:07:20+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe no specs #AGENTTESLA regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
6232"C:\Users\admin\AppData\Local\Temp\72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe" C:\Users\admin\AppData\Local\Temp\72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6260"C:\Users\admin\AppData\Local\Temp\72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
AgentTesla
(PID) Process(6260) RegSvcs.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
PasswordVecls16@Vezs
Total events
839
Read events
839
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
623272a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exeC:\Users\admin\AppData\Local\Temp\overfertilizebinary
MD5:2C540DBCFDC7734A99BE27DE0897ECD6
SHA256:6DAB636248D5910B3D249F7A754C2CDCDFED2235D81AE18E3A8600E0A2E15FFC
623272a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exeC:\Users\admin\AppData\Local\Temp\aut5670.tmpbinary
MD5:C8DD0B95344B8086BCBF5CC2AEE96689
SHA256:23CA6A4B82BAF90FE715B69E594E457EA982C1A82DC91C1611F8C161DC8ED06D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
34
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.173:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3832
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7132
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7132
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
unknown
1488
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5064
SearchApp.exe
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
unknown
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
unknown
23.48.23.173:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
unknown
4
System
192.168.100.255:138
unknown
1076
svchost.exe
2.23.242.9:443
go.microsoft.com
Ooredoo Q.S.C.
QA
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
unknown
google.com
  • 142.250.186.142
unknown
www.bing.com
  • 104.126.37.155
  • 104.126.37.160
  • 104.126.37.161
  • 104.126.37.147
  • 104.126.37.162
  • 104.126.37.163
  • 104.126.37.168
  • 104.126.37.145
  • 104.126.37.153
unknown
ocsp.digicert.com
  • 184.30.131.245
  • 192.229.221.95
unknown
crl.microsoft.com
  • 23.48.23.173
  • 23.48.23.164
  • 23.48.23.143
  • 23.48.23.177
  • 23.48.23.166
unknown
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
unknown
go.microsoft.com
  • 2.23.242.9
unknown
login.live.com
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.72
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.68
unknown
mail.pgsu.co.id
  • 107.178.108.41
unknown
arc.msn.com
  • 20.223.35.26
unknown

Threats

PID
Process
Class
Message
Successful Credential Theft Detected
STEALER [ANY.RUN] Attempt to exfiltrate via SMTP
No debug info