File name: | sample.zip |
Full analysis: | https://app.any.run/tasks/a2c4754e-a817-4605-92dd-7d1df04d06c1 |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | March 30, 2020, 21:05:09 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 53429A71FD64501BEDD9E35757B5764E |
SHA1: | 3BA26923B966FD932EA0AC917EB1F0ADB4DCDCC8 |
SHA256: | 89C926ADC4AB2A363358A71D890F2583CEFE9675C6566B8D2EFE045640FAE488 |
SSDEEP: | 768:9znpB/AGskF8t4BzW4zdgbTBG7SVv6zSGokhv:9pdAGskFlIB0Ov6ztnhv |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | Remittance_Payment_Remittance_0182937484373938339383.exe |
---|---|
ZipUncompressedSize: | 102400 |
ZipCompressedSize: | 25933 |
ZipCRC: | 0xc592d482 |
ZipModifyDate: | 2020:03:29 23:29:23 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3448 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\sample.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
3152 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3448.17067\Remittance_Payment_Remittance_0182937484373938339383.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3448.17067\Remittance_Payment_Remittance_0182937484373938339383.exe | — | WinRAR.exe |
User: admin Company: WONderware Integrity Level: MEDIUM Description: Roter Exit code: 0 Version: 1.00 | ||||
1696 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3448.17067\Remittance_Payment_Remittance_0182937484373938339383.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | Remittance_Payment_Remittance_0182937484373938339383.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Version: 2.0.50727.5420 (Win7SP1.050727-5400) |
PID | Process | Filename | Type | |
---|---|---|---|---|
1696 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\CabED75.tmp | — | |
MD5:— | SHA256:— | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\TarED76.tmp | — | |
MD5:— | SHA256:— | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B | binary | |
MD5:E5956B8CC5B41C2449FC1EE0AAFDF3DE | SHA256:9B4E7E051E65B6C0B6A58FB4E24E2D1F6FC6BCE3A6E58EE91E6145981CF87A28 | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_BA8650709FF65A42B9202D73C10A8F29 | der | |
MD5:75D636BF532AFFBC75F461235C3B4D5C | SHA256:727247C8DCAC2B6B8A4F5890F1BCE6F8AF87B49BC38F97308E706A6A313B66AF | |||
3448 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3448.17067\Remittance_Payment_Remittance_0182937484373938339383.exe | executable | |
MD5:24BE0904C7B63DA4C540AEEB2F64E912 | SHA256:19A0D5F14B8FECF68B66E690C125C4773EDFC07BD8289A3F5CF0E50021CE1034 | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_0B97942EE72A6E3F514E8E84F294CC72 | binary | |
MD5:376E409D25BA698001FAA24B21D39AE2 | SHA256:EDE91F250F72EBD704525153C2F9F01763CEBA793C7AEAE519182BFFAD77919D | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B | der | |
MD5:E550DA03AEE5B546B436CD553D3233B9 | SHA256:9ABFD4E29B96CCA442502B1DE6071FE0293455DF22B4EFF19FA3E6DF060947E7 | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_0B97942EE72A6E3F514E8E84F294CC72 | der | |
MD5:F26B1B29960D99AD1C44E71E3D2ABE4C | SHA256:7910B27AFDEE20EA27C4FA19221B1B63E00235E261E1A3FB9F1FB3456CBBB7AC | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\QZZ9VMTM.txt | text | |
MD5:28B846EF0B98391E33B2646F972E3629 | SHA256:B750274BADA451ACBFF05EAA7D99EFCECE55A7A140697164C0AFDE83A708B37C | |||
1696 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_BA8650709FF65A42B9202D73C10A8F29 | binary | |
MD5:6E8442114A2E555040AAD20BFB91C5C5 | SHA256:52B25A96BEDE0176C8EF7B53108A05BA359E7C0B2737090CCA0D3CC3ACAD7807 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1696 | RegAsm.exe | GET | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDL%2FQslYWVuogIAAAAAXGdc | US | der | 472 b | whitelisted |
1696 | RegAsm.exe | GET | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D | US | der | 468 b | whitelisted |
1696 | RegAsm.exe | GET | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEFOOHQjK5IlqCAAAAAAyCmA%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1696 | RegAsm.exe | 172.217.23.142:443 | drive.google.com | Google Inc. | US | whitelisted |
1696 | RegAsm.exe | 172.217.21.195:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
1696 | RegAsm.exe | 172.217.16.161:443 | doc-14-2o-docs.googleusercontent.com | Google Inc. | US | whitelisted |
1696 | RegAsm.exe | 208.91.199.225:587 | smtp.abiataltib.xyz | PDR | US | shared |
Domain | IP | Reputation |
---|---|---|
drive.google.com |
| shared |
ocsp.pki.goog |
| whitelisted |
doc-14-2o-docs.googleusercontent.com |
| shared |
smtp.abiataltib.xyz |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
1696 | RegAsm.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
1696 | RegAsm.exe | A Network Trojan was detected | SPYWARE [PTsecurity] AgentTesla Exfiltration |