| File name: | DHL AWB TRACKING DETAILS.exe |
| Full analysis: | https://app.any.run/tasks/484783c6-0a36-4c0c-a83c-31035339009f |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | June 24, 2025, 09:17:04 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | FF2C5270AD8512422AEDD8D49535D248 |
| SHA1: | B0AE4F09C0ABD240A7DC076FBD88058850A73B02 |
| SHA256: | C3B1C56D2C7B08A93AFB99A1AF3A7AEECF4A35ED80E6937951E385F4725D327C |
| SSDEEP: | 49152:kP86yczPjG/c4x0eX0wIxol1pwpyBaBgx2HBerkjoygO8eyGN71d6gFrtI3qcyL1:kPOcbjGk4x9X0wIxol1pwpyBaBgx2HBn |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:06:24 06:50:31+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.16 |
| CodeSize: | 633856 |
| InitializedDataSize: | 518144 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x204f7 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (British) |
| CharacterSet: | Unicode |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1356 | "C:\Users\admin\AppData\Local\Temp\DHL AWB TRACKING DETAILS.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | contrapose.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Exit code: 4294967295 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 2276 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3780 | "C:\Users\admin\AppData\Local\outvaunts\contrapose.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | contrapose.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Version: 4.8.9037.0 built by: NET481REL1 Modules
AgentTesla(PID) Process(3780) RegSvcs.exe Protocolsmtp Hostmail.coreghaco.com Port587 Usernamemary@coreghaco.com Password2k7c0T9h* | |||||||||||||||
| 4844 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7020 -s 620 | C:\Windows\SysWOW64\WerFault.exe | contrapose.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5080 | "C:\Users\admin\AppData\Local\Temp\DHL AWB TRACKING DETAILS.exe" | C:\Users\admin\AppData\Local\outvaunts\contrapose.exe | DHL AWB TRACKING DETAILS.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 7020 | "C:\Users\admin\AppData\Local\outvaunts\contrapose.exe" | C:\Users\admin\AppData\Local\outvaunts\contrapose.exe | wscript.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
| 7104 | "C:\Users\admin\AppData\Local\Temp\DHL AWB TRACKING DETAILS.exe" | C:\Users\admin\AppData\Local\Temp\DHL AWB TRACKING DETAILS.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 7152 | wscript "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\contrapose.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4844 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_contrapose.exe_222f9d8c8f1af1f5486e4c13fcceee1a88eac80_b17a90c2_0ca6983f-cdef-4a60-b307-b8d6e0a5918f\Report.wer | — | |
MD5:— | SHA256:— | |||
| 5080 | contrapose.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\contrapose.vbs | binary | |
MD5:F9EAE76B1FE35EF0A01C400E6743B1DE | SHA256:0B17EAEF28DEC2CF222A786EB2815EC7E2959C685BBDD4CC25C7E5129068CA92 | |||
| 7020 | contrapose.exe | C:\Users\admin\AppData\Local\Temp\aut5C58.tmp | binary | |
MD5:CEE3F357AC9E30FBDF039FB1EBBF856B | SHA256:73787937E76B6A9AF9A295B81B9D076EDF0017376F3F9933580EB44C4FF3BE99 | |||
| 7104 | DHL AWB TRACKING DETAILS.exe | C:\Users\admin\AppData\Local\Temp\aut4BDE.tmp | binary | |
MD5:CEE3F357AC9E30FBDF039FB1EBBF856B | SHA256:73787937E76B6A9AF9A295B81B9D076EDF0017376F3F9933580EB44C4FF3BE99 | |||
| 7104 | DHL AWB TRACKING DETAILS.exe | C:\Users\admin\AppData\Local\Temp\translucently | binary | |
MD5:5F6EBA664E6D64DAAC8FC575679D871A | SHA256:710AFA2AA454781F6F3992C8B61E726FC2893D8D2E1FB0F1285ABF706B128A4D | |||
| 7104 | DHL AWB TRACKING DETAILS.exe | C:\Users\admin\AppData\Local\outvaunts\contrapose.exe | executable | |
MD5:FF2C5270AD8512422AEDD8D49535D248 | SHA256:C3B1C56D2C7B08A93AFB99A1AF3A7AEECF4A35ED80E6937951E385F4725D327C | |||
| 4844 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE | binary | |
MD5:CD79CA54A458F8F5F59CF14C81AEBDA9 | SHA256:E9F282BABA7B3FFE50AC1CC52CD27D00ED506A74EF2EA667F1D6BA572DF19E05 | |||
| 4844 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE | der | |
MD5:0F7B8F6A846AA9CA52FA562DDDCDB5ED | SHA256:AFF90E65A81289B80D1FCC5E71B3D88E5D1AAFE22CE358EB6E28A56D1845263D | |||
| 4844 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\contrapose.exe.7020.dmp | dmp | |
MD5:86EA9D83B8E84BD7DDB46DA15A0A1350 | SHA256:414E690FC9A04A0FDE659A64F1F99F4558BD1149D3CB416FAF479F5C54D509ED | |||
| 4844 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785 | binary | |
MD5:CC84E045C8D9A9F47511410666A5A511 | SHA256:743FFD83FCDE3BC0185192DA26AF9F9576B1C6A0524A5B1C3262EB5F5999CA53 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4844 | WerFault.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4844 | WerFault.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6428 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2148 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2940 | svchost.exe | GET | 200 | 69.192.161.44:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
6428 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4984 | backgroundTaskHost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
756 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4844 | WerFault.exe | 20.42.73.29:443 | watson.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4844 | WerFault.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4844 | WerFault.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
mail.coreghaco.com |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
3780 | RegSvcs.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Attempt to exfiltrate via SMTP |