File name:

DHL express delivery.msg

Full analysis: https://app.any.run/tasks/283f8341-5cbc-4a0b-b82e-e269fe453dc8
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 02, 2024, 13:25:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
spam
smtp
stealer
agenttesla
exfiltration
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

8860E561C46966DA938BEA1A9C6296F0

SHA1:

725981B515F9E62B582B96FBAF1B0AD3C380E027

SHA256:

BAB403A4E9F1CF261DB4214F0BDEA7607BA0BDD609FDFDDB772CDBAD46399EE0

SSDEEP:

24576:89SIMc3rtc+f8sM3YfXmJmB5YlmWatRvu3gPfBIWuC45mqbN6/T5Y7:89SIMc3rtc+f8sM3YfXmJmBelmWatRvQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • OUTLOOK.EXE (PID: 3968)
    • Steals credentials from Web Browsers

      • REF_7348255142.exe (PID: 2268)
    • AGENTTESLA has been detected (YARA)

      • REF_7348255142.exe (PID: 2268)
    • Actions looks like stealing of personal data

      • REF_7348255142.exe (PID: 2268)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2204)
    • Process drops legitimate windows executable

      • OUTLOOK.EXE (PID: 3968)
      • WinRAR.exe (PID: 2204)
    • Starts a Microsoft application from unusual location

      • REF_7348255142.exe (PID: 1060)
      • REF_7348255142.exe (PID: 2240)
      • REF_7348255142.exe (PID: 2268)
    • Connects to SMTP port

      • REF_7348255142.exe (PID: 2268)
    • Accesses Microsoft Outlook profiles

      • REF_7348255142.exe (PID: 2268)
    • Application launched itself

      • REF_7348255142.exe (PID: 1060)
  • INFO

    • Checks supported languages

      • REF_7348255142.exe (PID: 1060)
      • REF_7348255142.exe (PID: 2240)
      • wmpnscfg.exe (PID: 2460)
      • REF_7348255142.exe (PID: 2268)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 2204)
      • OUTLOOK.EXE (PID: 3968)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2204)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2204)
    • Reads the machine GUID from the registry

      • REF_7348255142.exe (PID: 1060)
      • REF_7348255142.exe (PID: 2240)
      • REF_7348255142.exe (PID: 2268)
    • Reads the computer name

      • REF_7348255142.exe (PID: 1060)
      • REF_7348255142.exe (PID: 2240)
      • REF_7348255142.exe (PID: 2268)
      • wmpnscfg.exe (PID: 2460)
    • Manual execution by a user

      • REF_7348255142.exe (PID: 2240)
      • wmpnscfg.exe (PID: 2460)
    • Reads Environment values

      • REF_7348255142.exe (PID: 2268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(2268) REF_7348255142.exe
Protocolsmtp
Hostsmtp.leqsis.cl
Port587
Usernamedteulke@leqsis.cl
Passwordll01061970
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe winrar.exe ref_7348255142.exe no specs ref_7348255142.exe #AGENTTESLA ref_7348255142.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1060"C:\Users\admin\AppData\Local\Temp\Rar$EXa2204.16597\REF_7348255142.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2204.16597\REF_7348255142.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NDIS Classes
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2204.16597\ref_7348255142.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2204"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FL370UVE\REF_7348255142.rar"C:\Program Files\WinRAR\WinRAR.exe
OUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2240"C:\Users\admin\Desktop\REF_7348255142.exe" C:\Users\admin\Desktop\REF_7348255142.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
NDIS Classes
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\ref_7348255142.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2268"C:\Users\admin\AppData\Local\Temp\Rar$EXa2204.16597\REF_7348255142.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa2204.16597\REF_7348255142.exe
REF_7348255142.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NDIS Classes
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2204.16597\ref_7348255142.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
AgentTesla
(PID) Process(2268) REF_7348255142.exe
Protocolsmtp
Hostsmtp.leqsis.cl
Port587
Usernamedteulke@leqsis.cl
Passwordll01061970
2460"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3968"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\DHL express delivery.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\program files\microsoft office\office14\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
15 681
Read events
15 114
Write events
537
Delete events
30

Modification events

(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
(PID) Process:(3968) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
Off
Executable files
2
Suspicious files
3
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR3DE5.tmp.cvr
MD5:
SHA256:
3968OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{0111B8AC-441B-418B-A844-F3AC35F43784}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:4C61C12EDBC453D7AE184976E95258E1
SHA256:296526F9A716C1AA91BA5D6F69F0EB92FDF79C2CB2CFCF0CEB22B7CCBC27035F
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FL370UVE\REF_7348255142 (2).rar:Zone.Identifier:$DATAtext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
2204WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2204.16597\REF_7348255142.exeexecutable
MD5:74520DBFD9C35570466E714BCFB19E4C
SHA256:EACAA78674011816F02D7D81B9CBBF8EC91BC4E07561D773D55EDAF1475ED5DA
3968OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmbinary
MD5:1A072518733D76FA73C18167F318836D
SHA256:3A16ADDE600B70BB9EFBC0DA0C84B3B4F9DAADC458503246E6F5B3035BB4F92B
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FL370UVE\REF_7348255142.rar:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FL370UVE\REF_7348255142 (2).rarcompressed
MD5:DB5464389526C657D481B4E441C24DAC
SHA256:819B229F2DB9F8D19325D0E9032DD26E9E6BC72EFC8377B95914B973D9C2A47E
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FL370UVE\REF_7348255142.rarcompressed
MD5:DB5464389526C657D481B4E441C24DAC
SHA256:819B229F2DB9F8D19325D0E9032DD26E9E6BC72EFC8377B95914B973D9C2A47E
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
3
Threats
5

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
3968
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2268
REF_7348255142.exe
142.44.139.205:587
smtp.leqsis.cl
OVH SAS
CA
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
smtp.leqsis.cl
  • 142.44.139.205
unknown

Threats

PID
Process
Class
Message
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
2 ETPRO signatures available at the full report
No debug info