File name:

NEW PO.exe

Full analysis: https://app.any.run/tasks/ca7bfb69-d93e-4650-a661-9e7c95d9e3f5
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: October 23, 2023, 10:49:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
stealer
agenttesla
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

499FCD097494745598966B579E104135

SHA1:

64F24504A045E0C894FA88F29938246A06EE97B7

SHA256:

90D63293D26FF8D79D3CB130D63E4D69646527A8C61EA5308288980FCFD5189D

SSDEEP:

12288:MvoV41D4iDCrnr3htfw3XZYeyX5XwurjNUTW6:MvoYD4QAr3hFwmbXBzryK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • NEW PO.exe (PID: 308)
    • Drops the executable file immediately after the start

      • NEW PO.exe (PID: 308)
      • NEW PO.exe (PID: 2260)
    • Actions looks like stealing of personal data

      • NEW PO.exe (PID: 2260)
    • AGENTTESLA has been detected (YARA)

      • NEW PO.exe (PID: 2260)
    • Steals credentials from Web Browsers

      • NEW PO.exe (PID: 2260)
  • SUSPICIOUS

    • Application launched itself

      • NEW PO.exe (PID: 308)
    • Reads the Internet Settings

      • NEW PO.exe (PID: 308)
      • NEW PO.exe (PID: 2260)
    • Reads settings of System Certificates

      • NEW PO.exe (PID: 2260)
    • Connects to SMTP port

      • NEW PO.exe (PID: 2260)
    • Accesses Microsoft Outlook profiles

      • NEW PO.exe (PID: 2260)
  • INFO

    • Checks supported languages

      • NEW PO.exe (PID: 308)
      • NEW PO.exe (PID: 2260)
    • Reads the computer name

      • NEW PO.exe (PID: 308)
      • NEW PO.exe (PID: 2260)
    • Creates files or folders in the user directory

      • NEW PO.exe (PID: 308)
      • NEW PO.exe (PID: 2260)
    • Reads the machine GUID from the registry

      • NEW PO.exe (PID: 308)
      • NEW PO.exe (PID: 2260)
    • Reads Environment values

      • NEW PO.exe (PID: 2260)
    • Create files in a temporary directory

      • NEW PO.exe (PID: 308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(2260) NEW PO.exe
Protocolsmtp
Hostus2.smtp.mailhostbox.com
Port587
Usernameboys@opttools-tw.com
PasswordkV$bSqJ1 daniel
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

AssemblyVersion: 1.0.0.0
ProductVersion: 1.0.0.0
ProductName: project_QLBanXeMay
OriginalFileName: QorV.exe
LegalTrademarks: -
LegalCopyright: Copyright © 2019
InternalName: QorV.exe
FileVersion: 1.0.0.0
FileDescription: project_QLBanXeMay
CompanyName: -
Comments: -
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 4
EntryPoint: 0x8ec62
UninitializedDataSize: -
InitializedDataSize: 2048
CodeSize: 577024
LinkerVersion: 48
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2059:04:16 00:47:15+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start new po.exe no specs schtasks.exe no specs #AGENTTESLA new po.exe

Process information

PID
CMD
Path
Indicators
Parent process
308"C:\Users\admin\AppData\Local\Temp\NEW PO.exe" C:\Users\admin\AppData\Local\Temp\NEW PO.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
project_QLBanXeMay
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\new po.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
2260"C:\Users\admin\AppData\Local\Temp\NEW PO.exe"C:\Users\admin\AppData\Local\Temp\NEW PO.exe
NEW PO.exe
User:
admin
Integrity Level:
MEDIUM
Description:
project_QLBanXeMay
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\new po.exe
c:\windows\syswow64\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
AgentTesla
(PID) Process(2260) NEW PO.exe
Protocolsmtp
Hostus2.smtp.mailhostbox.com
Port587
Usernameboys@opttools-tw.com
PasswordkV$bSqJ1 daniel
2396"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dNXvWGdL" /XML "C:\Users\admin\AppData\Local\Temp\tmp4DD8.tmp"C:\Windows\SysWOW64\schtasks.exeNEW PO.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\system32\wow64win.dll
Total events
1 012
Read events
999
Write events
13
Delete events
0

Modification events

(PID) Process:(308) NEW PO.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(308) NEW PO.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(308) NEW PO.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(308) NEW PO.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2260) NEW PO.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
2
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
308NEW PO.exeC:\Users\admin\AppData\Roaming\dNXvWGdL.exeexecutable
MD5:499FCD097494745598966B579E104135
SHA256:90D63293D26FF8D79D3CB130D63E4D69646527A8C61EA5308288980FCFD5189D
308NEW PO.exeC:\Users\admin\AppData\Local\Temp\tmp4DD8.tmpxml
MD5:6AE00B975C7B721458A3D9440B7C60F3
SHA256:993D07ADF38A5CACFAAE5F6D7CF768E07130FC7993E3D7808675B6F63F4FFF46
2260NEW PO.exeC:\Users\admin\AppData\Roaming\sOFvE\sOFvE.exeexecutable
MD5:499FCD097494745598966B579E104135
SHA256:90D63293D26FF8D79D3CB130D63E4D69646527A8C61EA5308288980FCFD5189D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
2
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2260
NEW PO.exe
173.231.16.77:443
api.ipify.org
WEBNX
US
unknown
2260
NEW PO.exe
208.91.199.224:587
us2.smtp.mailhostbox.com
UNIFIEDLAYER-AS-1
US
shared

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 173.231.16.77
  • 64.185.227.156
  • 104.237.62.212
shared
us2.smtp.mailhostbox.com
  • 208.91.199.224
  • 208.91.199.225
  • 208.91.198.143
  • 208.91.199.223
shared

Threats

PID
Process
Class
Message
324
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2260
NEW PO.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2260
NEW PO.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Exfiltration via SMTP (AgentTesla)
No debug info