| File name: | Orden de compra.eml |
| Full analysis: | https://app.any.run/tasks/73bb5a35-fff2-49c0-af4b-b9d25caa611a |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | May 17, 2025, 02:54:17 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | message/rfc822 |
| File info: | SMTP mail, ASCII text, with CRLF line terminators |
| MD5: | 610133724927F138608AB3F016B52A30 |
| SHA1: | 292C6992D1A61E3B35D3741A3C3BD1FEFA985287 |
| SHA256: | 99D3E781968BA117811CB28EF4B8CD522BD535A6C17552D679A3F7C47D2868A1 |
| SSDEEP: | 24576:AsERJuW4UJf7JsPIHXzPTRCjGSBD0C+/ENR6i:MBjXHSBL+/Ex |
| .eml | | | E-Mail message (Var. 1) (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1080 | C:\Windows\system32\svchost.exe -k NetworkService | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1500 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe | WinRAR.exe | ||||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java Platform SE binary Exit code: 0 Version: 8.0.4510.0 Modules
| |||||||||||||||
| 1648 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe | Orden de compra_896758576568857657858756857645674656745677.exe | ||||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java Platform SE binary Exit code: 1073807364 Version: 8.0.4510.0 Modules
AgentTesla(PID) Process(1648) Orden de compra_896758576568857657858756857645674656745677.exe Protocolsmtp Hostmail.rvoccte.com Port587 Usernamenewfile@rvoccte.com PasswordPJtiky;+*ayY | |||||||||||||||
| 1996 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\EPR4LYPB\Orden de compra_896758576_pdf.uue" | C:\Program Files\WinRAR\WinRAR.exe | — | OUTLOOK.EXE | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 2452 | "C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\Desktop\Orden de compra.eml" | C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Exit code: 0 Version: 14.0.6025.1000 Modules
| |||||||||||||||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: Off | |||
| (PID) Process: | (2452) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1055 |
Value: Off | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2452 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVR1C9B.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2452 | OUTLOOK.EXE | C:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst | — | |
MD5:— | SHA256:— | |||
| 1996 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa1996.28496\Orden de compra_896758576568857657858756857645674656745677.exe | — | |
MD5:— | SHA256:— | |||
| 2452 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inf | text | |
MD5:F3B25701FE362EC84616A93A45CE9998 | SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 | |||
| 2452 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | binary | |
MD5:67BE0FF6060D149044999838748E5F7D | SHA256:E157BD02DFDE9C06917C8B3FD83559463EA51926522D4E0D3D665D3AC600735D | |||
| 1500 | Orden de compra_896758576568857657858756857645674656745677.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\Corts71.ini | text | |
MD5:55BF2BF5F7D4DB1559610934797093E7 | SHA256:4B2DFDF198B29350EA4A0B8013581B09D5304671BDDC95066AFCC34F425C67C6 | |||
| 1500 | Orden de compra_896758576568857657858756857645674656745677.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\biblioteket.fem | binary | |
MD5:6359958A40596213AC792116518CDBB3 | SHA256:122B0F7E1F6A2DD43BAF470BA4F3D98F55AFA091C5171D56632E770D45596E21 | |||
| 2452 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\tmp20B4.tmp | binary | |
MD5:D831978B14E33DA627BC781CEDFEAD8A | SHA256:3E17901830B4DEA2B3D7E2280D1DBE142D033C3A7B48B90622BFA40BA580539C | |||
| 1500 | Orden de compra_896758576568857657858756857645674656745677.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\Tekststykker\Reprogramed.txt | text | |
MD5:6BD8921967057C1EDDD60680F4A40CB1 | SHA256:E629769FAC5693A9DDCFE75DFFD9DF63D5353CED0DC5568704FE70F72F8852EB | |||
| 1500 | Orden de compra_896758576568857657858756857645674656745677.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Triplopia12\conduce\Tekststykker\Hovedpinetablettens.txt | text | |
MD5:9D4A09BCFF22EE1C84B1C092D19854D7 | SHA256:4FCA47AF7C8FDDF292B2777D520D44D00A55997871544C70C6F5E151EF77077E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | — | — | whitelisted |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | GET | 200 | 198.12.83.69:80 | http://198.12.83.69/SOYrCyIiGRkX220.bin | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2452 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | 198.12.83.69:80 | — | AS-COLOCROSSING | US | unknown |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | whitelisted |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | 67.18.65.183:587 | mail.rvoccte.com | — | US | malicious |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
config.messenger.msn.com |
| whitelisted |
dns.msftncsi.com |
| whitelisted |
ip-api.com |
| whitelisted |
mail.rvoccte.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Potentially Bad Traffic | ET HUNTING Generic .bin download from Dotted Quad |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
1080 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
1080 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Base64 encoded Login Exfiltration Atempt (shifted+1) |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Base64 encoded Password Exfiltration Atempt (shifted+1) |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Base64 encoded Password Exfiltration Atempt |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Misc activity | INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO) |
1648 | Orden de compra_896758576568857657858756857645674656745677.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Base64 encoded Login Exfiltration Atempt |