| File name: | New Text Document.bin.exe |
| Full analysis: | https://app.any.run/tasks/ab5d523b-c67d-4377-9f47-0c0839579415 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | January 25, 2024, 12:26:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 0B0D247AA1F24C2F5867B3BF29F69450 |
| SHA1: | 48DE9F34226FD7F637E2379365BE035AF5C0DF1A |
| SHA256: | A6E7292E734C3A15CFA654BBA8DEA72A2F55F1C24CF6BBDC2FD7E63887E9315A |
| SSDEEP: | 12288:dcgCzNHJj96xfKJStJkRm3bYXob0AnmFMcaGQxkZVVVVVVVVVAtVVVUvqGV:UQKgLIQmFuGQxklvqO |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:10:03 09:51:19+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.33 |
| CodeSize: | 214528 |
| InitializedDataSize: | 119296 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x21d50 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Users\admin\AppData\Local\XDR Encode LIB\xdrencodelib.exe" -i | C:\Users\admin\AppData\Local\XDR Encode LIB\xdrencodelib.exe | tuc5.tmp | ||||||||||||
User: admin Integrity Level: HIGH Description: ExpressCenter Exit code: 0 Version: 1, 20, 0, 1 Modules
| |||||||||||||||
| 128 | "C:\Users\admin\Desktop\a\num.exe" | C:\Users\admin\Desktop\a\num.exe | New Text Document.exe | ||||||||||||
User: admin Company: MAGIX Computer Products Intl. Co. Integrity Level: MEDIUM Description: VEGAS Pro Exit code: 0 Version: 14.0.0.211 Modules
| |||||||||||||||
| 584 | "C:\Users\admin\Desktop\a\288c47bbc1871b439df19ff4df68f0766.exe" | C:\Users\admin\Desktop\a\288c47bbc1871b439df19ff4df68f0766.exe | — | New Text Document.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 600 | "C:\Users\admin\Desktop\a\next.exe" | C:\Users\admin\Desktop\a\next.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 680 | C:\Users\admin\Desktop\a\Awwnbpxqsf.exe | C:\Users\admin\Desktop\a\Awwnbpxqsf.exe | — | Awwnbpxqsf.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
| 764 | "C:\Users\admin\Desktop\a\flesh.exe" | C:\Users\admin\Desktop\a\flesh.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 880 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | crypted_d786fd3e.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 884 | "C:\Users\admin\Desktop\a\Zjqkz.exe" | C:\Users\admin\Desktop\a\Zjqkz.exe | — | New Text Document.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 896 | "C:\Users\admin\Desktop\a\stan.exe" | C:\Users\admin\Desktop\a\stan.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 900 | "C:\Users\admin\Desktop\a\StealerClient_Cpp_1_3.exe" | C:\Users\admin\Desktop\a\StealerClient_Cpp_1_3.exe | — | New Text Document.exe | |||||||||||
User: admin Company: Oracle Integrity Level: MEDIUM Description: VirtualBox ExtPack Helper Exit code: 0 Version: 7.0.10.8379 Modules
| |||||||||||||||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2672) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2372) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2968) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1404) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2396 | New Text Document.bin.exe | C:\Users\admin\Desktop\Пароли Chrome.csv | binary | |
MD5:64F50AFB35DD16EE46F187015CEE84CE | SHA256:C2D389870DE77426A31A8C478E0FDDCBBEA7A3733B453806317914E6F946EA91 | |||
| 1404 | New Text Document.exe | C:\Users\admin\Desktop\a\tuc5.exe | executable | |
MD5:5E6D8C73D07FA0303D7E6DDA244C0189 | SHA256:BCE43A791F179892491AF55D87ABF9CB56DA17C1BC81AF2FC68B5E903A2CBB29 | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\Temp\is-0PECF.tmp\_isetup\_RegDLL.tmp | executable | |
MD5:0EE914C6F0BB93996C75941E1AD629C6 | SHA256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2 | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\Temp\is-0PECF.tmp\_isetup\_iscrypt.dll | executable | |
MD5:A69559718AB506675E907FE49DEB71E9 | SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\Temp\is-0PECF.tmp\_isetup\_shfoldr.dll | executable | |
MD5:92DC6EF532FBB4A5C3201469A5B5EB63 | SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87 | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\Temp\is-0PECF.tmp\_isetup\_isdecmp.dll | executable | |
MD5:B6F11A0AB7715F570F45900A1FE84732 | SHA256:E47DD306A9854599F02BC1B07CA6DFBD5220F8A1352FAA9616D1A327DE0BBF67 | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\XDR Encode LIB\unins000.exe | executable | |
MD5:2C9E07C6B8079BD778783E30E5D1E182 | SHA256:45B4AC1232C914216881890DA121725936417814F34304816E28D85A76574ADA | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\XDR Encode LIB\is-SS31T.tmp | executable | |
MD5:59A6413FB2CC89FD8651B1D2962FB8B9 | SHA256:FED76003F544525783796A22A07B190A8340874C11B5CF1999196C697D51E154 | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\XDR Encode LIB\is-Q93RB.tmp | executable | |
MD5:2C9E07C6B8079BD778783E30E5D1E182 | SHA256:45B4AC1232C914216881890DA121725936417814F34304816E28D85A76574ADA | |||
| 2372 | New Text Document.exe | C:\Users\admin\Desktop\a\grace.exe | executable | |
MD5:2EB93DAECF86D6E3748F12009553E71E | SHA256:78AADD377E0F48690C32AEB0F5482A3EF4F1E4EA3675B442C46AB7298BEF68D1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2672 | New Text Document.exe | GET | 200 | 64.31.22.34:80 | http://ftsolutions.com.pk/v1220-55000.exe | unknown | executable | 5.44 Mb | unknown |
2372 | New Text Document.exe | GET | 200 | 104.21.80.24:80 | http://silco.ayazprak.com/order/tuc5.exe | unknown | executable | 3.50 Mb | unknown |
1404 | New Text Document.exe | GET | 200 | 104.21.15.216:80 | http://ok.spartabig.com/order/adobe.exe | unknown | executable | 3.36 Mb | unknown |
2968 | New Text Document.exe | GET | 200 | 107.175.243.133:80 | http://107.175.243.133/4030/conhost.exe | unknown | executable | 331 Kb | unknown |
2672 | New Text Document.exe | GET | 200 | 78.138.46.125:80 | http://78.138.46.125/grace.exe | unknown | executable | 1.18 Mb | unknown |
2968 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/gold1201001.exe | unknown | executable | 1.25 Mb | unknown |
2372 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/Awwnbpxqsf.exe | unknown | executable | 1.07 Mb | unknown |
2968 | New Text Document.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e5ea96a1612133ed | unknown | compressed | 65.2 Kb | unknown |
2968 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/2024.exe | unknown | executable | 300 Kb | unknown |
1404 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/alex.exe | unknown | executable | 1.73 Mb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2672 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2672 | New Text Document.exe | 64.31.22.34:80 | ftsolutions.com.pk | LIMESTONENETWORKS | US | unknown |
1404 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2372 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2372 | New Text Document.exe | 104.21.80.24:80 | silco.ayazprak.com | CLOUDFLARENET | — | unknown |
2968 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2968 | New Text Document.exe | 107.175.243.133:80 | — | AS-COLOCROSSING | US | unknown |
1404 | New Text Document.exe | 104.21.15.216:80 | ok.spartabig.com | CLOUDFLARENET | — | unknown |
2968 | New Text Document.exe | 144.76.136.153:443 | transfer.sh | Hetzner Online GmbH | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
ftsolutions.com.pk |
| unknown |
silco.ayazprak.com |
| unknown |
ok.spartabig.com |
| unknown |
transfer.sh |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
api.ipify.org |
| shared |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
ji.alie3ksgbb.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2672 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2672 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2672 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2372 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2372 | New Text Document.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
2372 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2372 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2372 | New Text Document.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
1404 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1404 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
rave.exe | NtDebugWriter |
rave.exe | Facepalm |
stan.exe | NtDebugWriter |
stan.exe | Facepalm |