| File name: | c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe |
| Full analysis: | https://app.any.run/tasks/f8890bc1-ebc0-4b63-83c5-5dbe4821d018 |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | March 26, 2024, 10:14:21 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows |
| MD5: | 8F1DAD67EA5F8DB133CEC0B34D1B32F3 |
| SHA1: | 4731E8F991CE738B500891231A3693F836844F31 |
| SHA256: | C5E19B4AA3F82436910D009A5F36BDDDF44314F6A68F6CD9314D6B958382D9FC |
| SSDEEP: | 24576:vILpe46lO1Qdf2pSblJD/N3NFt3HHlPn7JL5pBYgaqfRHKt4PLeyvS:vINe46Y1Qdf2pSblJD/N3NFt3HFPn7J8 |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2079:06:22 00:20:04+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 48 |
| CodeSize: | 15264 |
| InitializedDataSize: | 1494 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x0000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | WeAreNotHealthy |
| FileVersion: | 1.0.0.0 |
| InternalName: | WeAreNotHealthy.exe |
| LegalCopyright: | Copyright © 2024 |
| LegalTrademarks: | - |
| OriginalFileName: | WeAreNotHealthy.exe |
| ProductName: | WeAreNotHealthy |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1488 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3196 | "C:\Users\admin\AppData\Local\Temp\c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe" | C:\Users\admin\AppData\Local\Temp\c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: WeAreNotHealthy Exit code: 3221226356 Version: 1.0.0.0 Modules
| |||||||||||||||
| 6364 | C:\WINDOWS\system32\WerFault.exe -u -p 3196 -s 1112 | C:\Windows\System32\WerFault.exe | c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6560 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe | c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: AddInProcess.exe Version: 4.8.9037.0 built by: NET481REL1 Modules
AgentTesla(PID) Process(6560) AddInProcess32.exe Protocolsmtp Hostv116306.kasserver.com Port587 Usernamebestellung@fmz-gmbh.de PasswordT7qkM5vwo3t47fFh | |||||||||||||||
| 6568 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe | — | c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: AddInProcess.exe Exit code: 4294967295 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| (PID) Process: | (6364) WerFault.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property |
| Operation: | write | Name: | 0018C00CDC5C2937 |
Value: 0100000001000000D08C9DDF0115D1118C7A00C04FC297EB01000000C66C4C2452BC3E41B39B979DAB8925F700000000020000000000106600000001000020000000004C90042FD8ABA32A61CEFFDE81482BB3DE0E8941468068E292CA035E5B55F6000000000E8000000002000020000000D880B61CD28DABE980DAED0D32ECFA5820BF8B14167B5A4E863C268F0F0E6A2080000000B1B00B117F73B02FBF1F417910638A949859ADD00B3987388AF2ED987420BEE9067AD0884B886AA40AB14D60E9A9C0ED1753E0BD4BAE8790BE83566823B05DC455628CD47377537110BB6463E84796FA3BE841CAB090BEDB558E35EBD4759C7E7E777BA33EB1BE4DD64633400546229269314C8AB78925EEFABD7805131E8AB34000000013E4AE628393A56B16BD82F50B7F2CC5E40BE29DE4B573E093BDA3BABE0973C67B419CC48B75A6BA7C8895CB472410F5B154FA2BEC9EEFB01F958FE468FB63BA | |||
| (PID) Process: | (6364) WerFault.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363} |
| Operation: | write | Name: | DeviceTicket |
Value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| |||
| (PID) Process: | (6364) WerFault.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363} |
| Operation: | write | Name: | DeviceId |
Value: 0018C00CDC5C2937 | |||
| (PID) Process: | (6364) WerFault.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363} |
| Operation: | write | Name: | ApplicationFlags |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6364 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERFE08.tmp.dmp | binary | |
MD5:— | SHA256:— | |||
| 6364 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER27D.tmp.WERInternalMetadata.xml | xml | |
MD5:— | SHA256:— | |||
| 6364 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER388.tmp.xml | xml | |
MD5:— | SHA256:— | |||
| 6364 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_c5e19b4aa3f82436_64af8380507ec3f086b8ed282a44c2e75030bd2e_0b3328d9_b6a3d84e-5253-44c9-aa4a-c208cdfd73ce\Report.wer | — | |
MD5:— | SHA256:— | |||
| 6364 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\c5e19b4aa3f82436910d009a5f36bdddf44314f6a68f6cd9314d6b958382d9fc.exe.3196.dmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3996 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | unknown |
4468 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D | unknown | — | — | unknown |
5112 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | unknown |
5112 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4828 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
3996 | svchost.exe | 40.126.31.71:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4084 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1280 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3996 | svchost.exe | 192.229.221.95:80 | — | EDGECAST | US | whitelisted |
6364 | WerFault.exe | 52.168.117.173:443 | umwatson.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
6560 | AddInProcess32.exe | 85.13.147.213:587 | v116306.kasserver.com | Neue Medien Muennich GmbH | DE | unknown |
3996 | svchost.exe | 20.190.159.64:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1072 | backgroundTaskHost.exe | 104.126.37.155:443 | www.bing.com | Akamai International B.V. | DE | unknown |
1280 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
umwatson.events.data.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
v116306.kasserver.com |
| unknown |
www.bing.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |