| File name: | New Text Document.bin.exe |
| Full analysis: | https://app.any.run/tasks/ab5d523b-c67d-4377-9f47-0c0839579415 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | January 25, 2024, 12:26:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 0B0D247AA1F24C2F5867B3BF29F69450 |
| SHA1: | 48DE9F34226FD7F637E2379365BE035AF5C0DF1A |
| SHA256: | A6E7292E734C3A15CFA654BBA8DEA72A2F55F1C24CF6BBDC2FD7E63887E9315A |
| SSDEEP: | 12288:dcgCzNHJj96xfKJStJkRm3bYXob0AnmFMcaGQxkZVVVVVVVVVAtVVVUvqGV:UQKgLIQmFuGQxklvqO |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:10:03 09:51:19+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.33 |
| CodeSize: | 214528 |
| InitializedDataSize: | 119296 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x21d50 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Users\admin\AppData\Local\XDR Encode LIB\xdrencodelib.exe" -i | C:\Users\admin\AppData\Local\XDR Encode LIB\xdrencodelib.exe | tuc5.tmp | ||||||||||||
User: admin Integrity Level: HIGH Description: ExpressCenter Exit code: 0 Version: 1, 20, 0, 1 Modules
| |||||||||||||||
| 128 | "C:\Users\admin\Desktop\a\num.exe" | C:\Users\admin\Desktop\a\num.exe | New Text Document.exe | ||||||||||||
User: admin Company: MAGIX Computer Products Intl. Co. Integrity Level: MEDIUM Description: VEGAS Pro Exit code: 0 Version: 14.0.0.211 Modules
| |||||||||||||||
| 584 | "C:\Users\admin\Desktop\a\288c47bbc1871b439df19ff4df68f0766.exe" | C:\Users\admin\Desktop\a\288c47bbc1871b439df19ff4df68f0766.exe | — | New Text Document.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 600 | "C:\Users\admin\Desktop\a\next.exe" | C:\Users\admin\Desktop\a\next.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 680 | C:\Users\admin\Desktop\a\Awwnbpxqsf.exe | C:\Users\admin\Desktop\a\Awwnbpxqsf.exe | — | Awwnbpxqsf.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
| 764 | "C:\Users\admin\Desktop\a\flesh.exe" | C:\Users\admin\Desktop\a\flesh.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 880 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | crypted_d786fd3e.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 884 | "C:\Users\admin\Desktop\a\Zjqkz.exe" | C:\Users\admin\Desktop\a\Zjqkz.exe | — | New Text Document.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 896 | "C:\Users\admin\Desktop\a\stan.exe" | C:\Users\admin\Desktop\a\stan.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 900 | "C:\Users\admin\Desktop\a\StealerClient_Cpp_1_3.exe" | C:\Users\admin\Desktop\a\StealerClient_Cpp_1_3.exe | — | New Text Document.exe | |||||||||||
User: admin Company: Oracle Integrity Level: MEDIUM Description: VirtualBox ExtPack Helper Exit code: 0 Version: 7.0.10.8379 Modules
| |||||||||||||||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2396) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2672) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2372) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2968) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1404) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2672 | New Text Document.exe | C:\Users\admin\Desktop\a\vLnNHh.exe | executable | |
MD5:38EA9A029DFF6005919E4F195B275A69 | SHA256:A7D2010888096F3A0AD884B423EBE9432C13A9ED8C1AA81DE541E9FD0838192F | |||
| 2968 | New Text Document.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:AC05D27423A85ADC1622C714F2CB6184 | SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D | |||
| 3828 | tuc5.tmp | C:\Users\admin\AppData\Local\Temp\is-0PECF.tmp\_isetup\_RegDLL.tmp | executable | |
MD5:0EE914C6F0BB93996C75941E1AD629C6 | SHA256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2 | |||
| 2396 | New Text Document.bin.exe | C:\Users\admin\Desktop\Пароли Chrome.csv | binary | |
MD5:64F50AFB35DD16EE46F187015CEE84CE | SHA256:C2D389870DE77426A31A8C478E0FDDCBBEA7A3733B453806317914E6F946EA91 | |||
| 2968 | New Text Document.exe | C:\Users\admin\Desktop\a\conhost.exe | executable | |
MD5:36CE48E31D675698D3DE4FD0C982610F | SHA256:070B9D022843AC420D8BDFCB8F91D5D5DACE6DDC452CFF9E0D3F85D564030D31 | |||
| 2968 | New Text Document.exe | C:\Users\admin\AppData\Local\Temp\Cab587A.tmp | compressed | |
MD5:AC05D27423A85ADC1622C714F2CB6184 | SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D | |||
| 1404 | New Text Document.exe | C:\Users\admin\Desktop\a\tuc5.exe | executable | |
MD5:5E6D8C73D07FA0303D7E6DDA244C0189 | SHA256:BCE43A791F179892491AF55D87ABF9CB56DA17C1BC81AF2FC68B5E903A2CBB29 | |||
| 2372 | New Text Document.exe | C:\Users\admin\Desktop\a\grace.exe | executable | |
MD5:2EB93DAECF86D6E3748F12009553E71E | SHA256:78AADD377E0F48690C32AEB0F5482A3EF4F1E4EA3675B442C46AB7298BEF68D1 | |||
| 2968 | New Text Document.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:5D32C74B6C6E12433E1CBE041370B635 | SHA256:19B877E15403A0BEB5E44D79082A680AD31CD11694678BA0FA866124358DFDA7 | |||
| 2396 | New Text Document.bin.exe | C:\Users\admin\Desktop\New Text Document.exe | executable | |
MD5:A239A27C2169AF388D4F5BE6B52F272C | SHA256:98E895F711226A32BFAB152E224279D859799243845C46E550C2D32153C619FC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2672 | New Text Document.exe | GET | 200 | 64.31.22.34:80 | http://ftsolutions.com.pk/v1220-55000.exe | unknown | executable | 5.44 Mb | unknown |
2372 | New Text Document.exe | GET | 200 | 104.21.80.24:80 | http://silco.ayazprak.com/order/tuc5.exe | unknown | executable | 3.50 Mb | unknown |
2968 | New Text Document.exe | GET | 200 | 107.175.243.133:80 | http://107.175.243.133/4030/conhost.exe | unknown | executable | 331 Kb | unknown |
2968 | New Text Document.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e5ea96a1612133ed | unknown | compressed | 65.2 Kb | unknown |
2968 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/gold1201001.exe | unknown | executable | 1.25 Mb | unknown |
2672 | New Text Document.exe | GET | 200 | 78.138.46.125:80 | http://78.138.46.125/grace.exe | unknown | executable | 1.18 Mb | unknown |
1404 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/alex.exe | unknown | executable | 1.73 Mb | unknown |
2672 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/Loader.exe | unknown | executable | 3.51 Mb | unknown |
2372 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/TrueCrypt_NKwtUN.exe | unknown | executable | 3.17 Mb | unknown |
1404 | New Text Document.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/lego/swizzy.exe | unknown | executable | 411 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2672 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2672 | New Text Document.exe | 64.31.22.34:80 | ftsolutions.com.pk | LIMESTONENETWORKS | US | unknown |
1404 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2372 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2372 | New Text Document.exe | 104.21.80.24:80 | silco.ayazprak.com | CLOUDFLARENET | — | unknown |
2968 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2968 | New Text Document.exe | 107.175.243.133:80 | — | AS-COLOCROSSING | US | unknown |
1404 | New Text Document.exe | 104.21.15.216:80 | ok.spartabig.com | CLOUDFLARENET | — | unknown |
2968 | New Text Document.exe | 144.76.136.153:443 | transfer.sh | Hetzner Online GmbH | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
ftsolutions.com.pk |
| unknown |
silco.ayazprak.com |
| unknown |
ok.spartabig.com |
| unknown |
transfer.sh |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
api.ipify.org |
| shared |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
ji.alie3ksgbb.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2672 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2672 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2672 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2372 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2372 | New Text Document.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
2372 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2372 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2372 | New Text Document.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
1404 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1404 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
rave.exe | NtDebugWriter |
rave.exe | Facepalm |
stan.exe | NtDebugWriter |
stan.exe | Facepalm |