File name:

Payments Copy.pdf.r00

Full analysis: https://app.any.run/tasks/369a0731-e0b7-4181-88dc-ae2e16af213a
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: November 23, 2023, 12:01:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
agenttesla
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

ED041C4EEF6BEDE6939646D4C04A5746

SHA1:

97238A8F749E43BE48919B72F8AED734A25FC48F

SHA256:

800DDFEA3ABB589DB5E49B8379B350C7C899C8240F58CD26B0B6BD3DF0787FEB

SSDEEP:

24576:GL16jKc0wDYIDPUXkiL4OM3ALiY7u8Yqv11MgAlH6VPF:GL16Wc0wDpPUXkiL4OMwLiY7u8Yqv11v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AGENTTESLA has been detected (YARA)

      • Payments Copy.pdf.exe (PID: 3928)
    • Steals credentials from Web Browsers

      • Payments Copy.pdf.exe (PID: 3928)
    • Actions looks like stealing of personal data

      • Payments Copy.pdf.exe (PID: 3928)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3128)
    • Reads the Internet Settings

      • Payments Copy.pdf.exe (PID: 3508)
      • Payments Copy.pdf.exe (PID: 3928)
    • Application launched itself

      • Payments Copy.pdf.exe (PID: 3508)
    • Accesses Microsoft Outlook profiles

      • Payments Copy.pdf.exe (PID: 3928)
    • Connects to SMTP port

      • Payments Copy.pdf.exe (PID: 3928)
    • Reads settings of System Certificates

      • Payments Copy.pdf.exe (PID: 3928)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3128)
    • Checks supported languages

      • Payments Copy.pdf.exe (PID: 3608)
      • Payments Copy.pdf.exe (PID: 3832)
      • wmpnscfg.exe (PID: 3536)
      • Payments Copy.pdf.exe (PID: 3928)
      • Payments Copy.pdf.exe (PID: 3508)
    • Manual execution by a user

      • Payments Copy.pdf.exe (PID: 3832)
      • wmpnscfg.exe (PID: 3536)
    • Reads the computer name

      • Payments Copy.pdf.exe (PID: 3608)
      • Payments Copy.pdf.exe (PID: 3928)
      • wmpnscfg.exe (PID: 3536)
      • Payments Copy.pdf.exe (PID: 3508)
      • Payments Copy.pdf.exe (PID: 3832)
    • Reads the machine GUID from the registry

      • Payments Copy.pdf.exe (PID: 3928)
      • wmpnscfg.exe (PID: 3536)
      • Payments Copy.pdf.exe (PID: 3508)
    • Reads Environment values

      • Payments Copy.pdf.exe (PID: 3928)
    • Create files in a temporary directory

      • Payments Copy.pdf.exe (PID: 3928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(3928) Payments Copy.pdf.exe
Protocolsmtp
Hostmail.ronaldsmith.loan
Port587
Usernamegrace.giving@ronaldsmith.loan
PasswordBillionPay$
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs payments copy.pdf.exe no specs payments copy.pdf.exe no specs payments copy.pdf.exe #AGENTTESLA payments copy.pdf.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3128"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Payments Copy.pdf.r00.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3508"C:\Users\admin\AppData\Local\Temp\Rar$EXa3128.37680\Payments Copy.pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3128.37680\Payments Copy.pdf.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Synchronization
Exit code:
0
Version:
10.0.5.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3128.37680\payments copy.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3536"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3608"C:\Users\admin\AppData\Local\Temp\Rar$EXa3128.38334\Payments Copy.pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3128.38334\Payments Copy.pdf.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Synchronization
Exit code:
4294967295
Version:
10.0.5.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3128.38334\payments copy.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3832"C:\Users\admin\Desktop\Payments Copy.pdf.exe" C:\Users\admin\Desktop\Payments Copy.pdf.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Host Synchronization
Exit code:
4294967295
Version:
10.0.5.0
Modules
Images
c:\users\admin\desktop\payments copy.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3928"C:\Users\admin\AppData\Local\Temp\Rar$EXa3128.37680\Payments Copy.pdf.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa3128.37680\Payments Copy.pdf.exe
Payments Copy.pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Synchronization
Exit code:
0
Version:
10.0.5.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3128.37680\payments copy.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
AgentTesla
(PID) Process(3928) Payments Copy.pdf.exe
Protocolsmtp
Hostmail.ronaldsmith.loan
Port587
Usernamegrace.giving@ronaldsmith.loan
PasswordBillionPay$
Total events
5 632
Read events
5 592
Write events
37
Delete events
3

Modification events

(PID) Process:(3128) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
3
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3128WinRAR.exeC:\Users\admin\Desktop\Payments Copy.pdf.exeexecutable
MD5:5F0180F9750AEE15A486A7C30B2BED26
SHA256:010AE6ADEE6452CF5D2583D396DACEFCCC6E946E35B3DB1280DC9500D8C1666A
3928Payments Copy.pdf.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:F3441B8572AAE8801C04F3060B550443
SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF
3928Payments Copy.pdf.exeC:\Users\admin\AppData\Local\Temp\TarE218.tmpbinary
MD5:9441737383D21192400ECA82FDA910EC
SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5
3928Payments Copy.pdf.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:9482237BAF09D0E2EAA9389DEF10FA60
SHA256:BBE3CDFD8FACB2DD4A24D6F433C8F646553F6D1DAE8BF8DC3F84B4A753E0F0BA
3128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3128.37680\Payments Copy.pdf.exeexecutable
MD5:5F0180F9750AEE15A486A7C30B2BED26
SHA256:010AE6ADEE6452CF5D2583D396DACEFCCC6E946E35B3DB1280DC9500D8C1666A
3928Payments Copy.pdf.exeC:\Users\admin\AppData\Local\Temp\CabE217.tmpcompressed
MD5:F3441B8572AAE8801C04F3060B550443
SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF
3128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3128.38334\Payments Copy.pdf.exeexecutable
MD5:5F0180F9750AEE15A486A7C30B2BED26
SHA256:010AE6ADEE6452CF5D2583D396DACEFCCC6E946E35B3DB1280DC9500D8C1666A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
3
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3928
Payments Copy.pdf.exe
GET
200
87.248.205.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?f01ebef07a16db3d
unknown
compressed
61.6 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
3928
Payments Copy.pdf.exe
64.185.227.156:443
api.ipify.org
WEBNX
US
unknown
3928
Payments Copy.pdf.exe
51.77.234.5:587
mail.ronaldsmith.loan
OVH SAS
FR
unknown
3928
Payments Copy.pdf.exe
87.248.205.0:80
ctldl.windowsupdate.com
LLNW
US
unknown

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 64.185.227.156
  • 104.237.62.212
  • 173.231.16.77
shared
mail.ronaldsmith.loan
  • 51.77.234.5
malicious
ctldl.windowsupdate.com
  • 87.248.205.0
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
3928
Payments Copy.pdf.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
No debug info