File name:

Orden de compra.eml

Full analysis: https://app.any.run/tasks/73bb5a35-fff2-49c0-af4b-b9d25caa611a
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 17, 2025, 02:54:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
java
evasion
stealer
smtp
exfiltration
agenttesla
Indicators:
MIME: message/rfc822
File info: SMTP mail, ASCII text, with CRLF line terminators
MD5:

610133724927F138608AB3F016B52A30

SHA1:

292C6992D1A61E3B35D3741A3C3BD1FEFA985287

SHA256:

99D3E781968BA117811CB28EF4B8CD522BD535A6C17552D679A3F7C47D2868A1

SSDEEP:

24576:AsERJuW4UJf7JsPIHXzPTRCjGSBD0C+/ENR6i:MBjXHSBL+/Ex

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Actions looks like stealing of personal data

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • AGENTTESLA has been detected (SURICATA)

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • AGENTTESLA has been detected (YARA)

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1996)
      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Executable content was dropped or overwritten

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Application launched itself

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • The process creates files with name similar to system file names

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Connects to the server without a host name

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Reads the Internet Settings

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Checks for external IP

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
      • svchost.exe (PID: 1080)
    • Accesses Microsoft Outlook profiles

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Connects to SMTP port

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Contacting a server suspected of hosting an CnC

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • The process connected to a server suspected of theft

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • There is functionality for taking screenshot (YARA)

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
  • INFO

    • Checks supported languages

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Reads the computer name

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Checks proxy server information

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Creates files or folders in the user directory

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Java executable

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • The sample compiled with english language support

      • OUTLOOK.EXE (PID: 2452)
    • Reads Environment values

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Create files in a temporary directory

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1500)
    • Reads the machine GUID from the registry

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
    • Disables trace logs

      • Orden de compra_896758576568857657858756857645674656745677.exe (PID: 1648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(1648) Orden de compra_896758576568857657858756857645674656745677.exe
Protocolsmtp
Hostmail.rvoccte.com
Port587
Usernamenewfile@rvoccte.com
PasswordPJtiky;+*ayY
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 1) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe winrar.exe no specs orden de compra_896758576568857657858756857645674656745677.exe #AGENTTESLA orden de compra_896758576568857657858756857645674656745677.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1500"C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe
WinRAR.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java Platform SE binary
Exit code:
0
Version:
8.0.4510.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1996.28496\orden de compra_896758576568857657858756857645674656745677.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1648"C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe
Orden de compra_896758576568857657858756857645674656745677.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java Platform SE binary
Exit code:
1073807364
Version:
8.0.4510.0
Modules
Images
c:\windows\system32\mshtml.dll
c:\users\admin\appdata\local\temp\rar$exa1996.28496\orden de compra_896758576568857657858756857645674656745677.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
AgentTesla
(PID) Process(1648) Orden de compra_896758576568857657858756857645674656745677.exe
Protocolsmtp
Hostmail.rvoccte.com
Port587
Usernamenewfile@rvoccte.com
PasswordPJtiky;+*ayY
1996"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\EPR4LYPB\Orden de compra_896758576_pdf.uue"C:\Program Files\WinRAR\WinRAR.exeOUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2452"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\Desktop\Orden de compra.eml"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\program files\microsoft office\office14\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
11 086
Read events
10 204
Write events
839
Delete events
43

Modification events

(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
(PID) Process:(2452) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
Off
Executable files
2
Suspicious files
16
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
2452OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR1C9B.tmp.cvr
MD5:
SHA256:
2452OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
1996WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe
MD5:
SHA256:
2452OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
2452OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmbinary
MD5:67BE0FF6060D149044999838748E5F7D
SHA256:E157BD02DFDE9C06917C8B3FD83559463EA51926522D4E0D3D665D3AC600735D
1500Orden de compra_896758576568857657858756857645674656745677.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\Corts71.initext
MD5:55BF2BF5F7D4DB1559610934797093E7
SHA256:4B2DFDF198B29350EA4A0B8013581B09D5304671BDDC95066AFCC34F425C67C6
1500Orden de compra_896758576568857657858756857645674656745677.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\biblioteket.fembinary
MD5:6359958A40596213AC792116518CDBB3
SHA256:122B0F7E1F6A2DD43BAF470BA4F3D98F55AFA091C5171D56632E770D45596E21
2452OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp20B4.tmpbinary
MD5:D831978B14E33DA627BC781CEDFEAD8A
SHA256:3E17901830B4DEA2B3D7E2280D1DBE142D033C3A7B48B90622BFA40BA580539C
1500Orden de compra_896758576568857657858756857645674656745677.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\Tekststykker\Reprogramed.txttext
MD5:6BD8921967057C1EDDD60680F4A40CB1
SHA256:E629769FAC5693A9DDCFE75DFFD9DF63D5353CED0DC5568704FE70F72F8852EB
1500Orden de compra_896758576568857657858756857645674656745677.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\Tekststykker\Hovedpinetablettens.txttext
MD5:9D4A09BCFF22EE1C84B1C092D19854D7
SHA256:4FCA47AF7C8FDDF292B2777D520D44D00A55997871544C70C6F5E151EF77077E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
10
DNS requests
5
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1648
Orden de compra_896758576568857657858756857645674656745677.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
1648
Orden de compra_896758576568857657858756857645674656745677.exe
GET
200
198.12.83.69:80
http://198.12.83.69/SOYrCyIiGRkX220.bin
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
2452
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1648
Orden de compra_896758576568857657858756857645674656745677.exe
198.12.83.69:80
AS-COLOCROSSING
US
unknown
1648
Orden de compra_896758576568857657858756857645674656745677.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
1648
Orden de compra_896758576568857657858756857645674656745677.exe
67.18.65.183:587
mail.rvoccte.com
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
config.messenger.msn.com
  • 64.4.26.155
whitelisted
dns.msftncsi.com
  • 131.107.255.255
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
mail.rvoccte.com
  • 67.18.65.183
malicious

Threats

PID
Process
Class
Message
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Potentially Bad Traffic
ET HUNTING Generic .bin download from Dotted Quad
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
1080
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
1080
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Base64 encoded Login Exfiltration Atempt (shifted+1)
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Base64 encoded Password Exfiltration Atempt (shifted+1)
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Base64 encoded Password Exfiltration Atempt
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
1648
Orden de compra_896758576568857657858756857645674656745677.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Base64 encoded Login Exfiltration Atempt
No debug info