File name:

proforma invoice.exe

Full analysis: https://app.any.run/tasks/cf8618ac-2e6a-4cf4-9dfe-ddabb295bbb7
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 15, 2025, 14:32:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
agenttesla
stealer
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

4CD97C3AF5DC22901FAE8C5851719EDE

SHA1:

EE483928AF409DC7C12265A631F04A324793C2DB

SHA256:

B46E55DB0693853F1F96A8BA2BAAD879F4E700DB1C976A4041427ED221538922

SSDEEP:

49152:VM/z4RNl+mOM/OSm7AYnUAxyad5n5vv2aC9FQKnVT+BfReQCGC8KRXC2RjD48PR:ez04f57+AR55vv1C9F3TgrTCFzR1Z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AGENTTESLA has been found (auto)

      • proforma invoice.exe (PID: 1912)
    • Uses Task Scheduler to run other applications

      • proforma invoice.exe (PID: 1912)
    • Steals credentials from Web Browsers

      • proforma invoice.exe (PID: 1764)
    • Actions looks like stealing of personal data

      • proforma invoice.exe (PID: 1764)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • proforma invoice.exe (PID: 1912)
    • Reads security settings of Internet Explorer

      • proforma invoice.exe (PID: 1912)
    • Application launched itself

      • proforma invoice.exe (PID: 1912)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • proforma invoice.exe (PID: 1764)
    • Connects to SMTP port

      • proforma invoice.exe (PID: 1764)
  • INFO

    • Reads the computer name

      • proforma invoice.exe (PID: 1912)
    • Reads the machine GUID from the registry

      • proforma invoice.exe (PID: 1912)
      • proforma invoice.exe (PID: 1764)
    • Checks supported languages

      • proforma invoice.exe (PID: 1912)
      • proforma invoice.exe (PID: 1764)
    • Create files in a temporary directory

      • proforma invoice.exe (PID: 1912)
    • Process checks computer location settings

      • proforma invoice.exe (PID: 1912)
    • Checks proxy server information

      • proforma invoice.exe (PID: 1764)
    • Reads the software policy settings

      • proforma invoice.exe (PID: 1764)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:05 08:55:41+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 774656
InitializedDataSize: 178176
UninitializedDataSize: -
EntryPoint: 0xbf01e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.1.1.1
ProductVersionNumber: 1.1.1.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: man
CompanyName: seat
FileDescription: man
FileVersion: 1.1.1.1
InternalName: NjPDP.exe
LegalCopyright: cop
LegalTrademarks: man
OriginalFileName: NjPDP.exe
ProductName: sea
ProductVersion: 1.1.1.1
AssemblyVersion: 1.1.1.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #AGENTTESLA proforma invoice.exe sppextcomobj.exe no specs slui.exe no specs schtasks.exe no specs conhost.exe no specs proforma invoice.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1532C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1764"C:\Users\admin\Desktop\proforma invoice.exe"C:\Users\admin\Desktop\proforma invoice.exe
proforma invoice.exe
User:
admin
Company:
seat
Integrity Level:
MEDIUM
Description:
man
Version:
1.1.1.1
Modules
Images
c:\users\admin\desktop\proforma invoice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1912"C:\Users\admin\Desktop\proforma invoice.exe" C:\Users\admin\Desktop\proforma invoice.exe
explorer.exe
User:
admin
Company:
seat
Integrity Level:
MEDIUM
Description:
man
Exit code:
0
Version:
1.1.1.1
Modules
Images
c:\users\admin\desktop\proforma invoice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2284"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4164"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CGWlZD" /XML "C:\Users\admin\AppData\Local\Temp\tmp3B6.tmp"C:\Windows\SysWOW64\schtasks.exeproforma invoice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6372\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
1 708
Read events
1 694
Write events
14
Delete events
0

Modification events

(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1764) proforma invoice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\proforma invoice_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1912proforma invoice.exeC:\Users\admin\AppData\Local\Temp\tmp3B6.tmpxml
MD5:74BC62E77EC2FD1F797D524D6899135B
SHA256:985FC2B4C395A70001A080435BF435DC8CB1124C7481C54AF9B0CF07CACD7788
1912proforma invoice.exeC:\Users\admin\AppData\Roaming\CGWlZD.exeexecutable
MD5:4CD97C3AF5DC22901FAE8C5851719EDE
SHA256:B46E55DB0693853F1F96A8BA2BAAD879F4E700DB1C976A4041427ED221538922
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
21
DNS requests
14
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.183:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5280
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5280
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
23.48.23.183:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.183
  • 23.48.23.156
  • 23.48.23.134
  • 23.48.23.149
  • 23.48.23.138
  • 23.48.23.159
  • 23.48.23.140
  • 23.48.23.137
  • 23.48.23.157
whitelisted
www.microsoft.com
  • 23.52.120.96
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.132
  • 20.190.160.17
  • 40.126.32.136
  • 20.190.160.131
  • 40.126.32.133
  • 40.126.32.134
  • 20.190.160.66
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
api.ipify.org
  • 172.67.74.152
  • 104.26.13.205
  • 104.26.12.205
shared
mail.iaa-airferight.com
  • 46.175.148.58
malicious
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
1764
proforma invoice.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
No debug info