File name:

ssd.exe

Full analysis: https://app.any.run/tasks/4b8ed132-82e5-4f57-85dd-e75ede09b2c3
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: December 19, 2024, 09:20:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
autoit
agenttesla
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

25FAAF0547DDFA428EEBEB9F294A543D

SHA1:

CE2E4895D420C6B978242A599C0AB342F91766CB

SHA256:

C620D711C48043D706EE5BC200E6087DB4B9D46B854AD8D8EB8BA47C9C770662

SSDEEP:

49152:5PPkzemqoSut3Jh4+QQ/btosJwIA4hHmZlKH2Tw/Pq83zw0bCjvk9G661QGtNq2Z:FP/mp7t3T4+B/btosJwIA4hHmZlKH2TF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 6648)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 6648)
    • AGENTTESLA has been detected (YARA)

      • RegSvcs.exe (PID: 6648)
      • ssd.exe (PID: 6564)
  • SUSPICIOUS

    • Executes application which crashes

      • ssd.exe (PID: 6564)
    • Connects to SMTP port

      • RegSvcs.exe (PID: 6648)
  • INFO

    • Reads the computer name

      • RegSvcs.exe (PID: 6648)
    • Create files in a temporary directory

      • ssd.exe (PID: 6564)
    • Checks supported languages

      • ssd.exe (PID: 6564)
      • RegSvcs.exe (PID: 6648)
    • The sample compiled with english language support

      • ssd.exe (PID: 6564)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 6648)
      • WerFault.exe (PID: 6800)
    • The process uses AutoIt

      • ssd.exe (PID: 6564)
    • Checks proxy server information

      • WerFault.exe (PID: 6800)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6800)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 6648)
    • Reads mouse settings

      • ssd.exe (PID: 6564)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(6564) ssd.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
Usernamejoko.wahyono@pgsu.co.id
PasswordVecls16@Vezs
(PID) Process(6648) RegSvcs.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
Usernamejoko.wahyono@pgsu.co.id
PasswordVecls16@Vezs
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:18 00:29:11+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 633856
InitializedDataSize: 542720
UninitializedDataSize: -
EntryPoint: 0x20577
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #AGENTTESLA ssd.exe #AGENTTESLA regsvcs.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6564"C:\Users\admin\AppData\Local\Temp\ssd.exe" C:\Users\admin\AppData\Local\Temp\ssd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\ssd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
AgentTesla
(PID) Process(6564) ssd.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
Usernamejoko.wahyono@pgsu.co.id
PasswordVecls16@Vezs
6648"C:\Users\admin\AppData\Local\Temp\ssd.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
ssd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
AgentTesla
(PID) Process(6648) RegSvcs.exe
Protocolsmtp
Hostmail.pgsu.co.id
Port587
Usernamejoko.wahyono@pgsu.co.id
PasswordVecls16@Vezs
6800C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6564 -s 724C:\Windows\SysWOW64\WerFault.exe
ssd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
4 121
Read events
4 121
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
8
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6800WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_ssd.exe_c1362a591e9a8f3c51987a51a1aa1d618fd1fb_19b100c3_42914b3f-73c9-4be3-a24b-11e94c392563\Report.wer
MD5:
SHA256:
6564ssd.exeC:\Users\admin\AppData\Local\Temp\Maianthemumbinary
MD5:4634966E7C85316D16A5422DBDAAEE02
SHA256:66E040957F2F1F35BC92B40204088E16E25DF68A544A611009C8A9CBE4253A0E
6800WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6800WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\ssd.exe.6564.dmpbinary
MD5:586F6C3615251161F78694C78025A4CD
SHA256:C30AB1355DAC469F5D8AD7391C20908EB9EB9B17A307991334717F358AFA0EDB
6564ssd.exeC:\Users\admin\AppData\Local\Temp\aut6247.tmpbinary
MD5:5DD91E16056B4E8DD3B9C4C672F56B61
SHA256:7E55F29BFEC93F7498525D294A41E03C4922CE005FD79D0C04B869B805D6E84C
6800WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6B41.tmp.WERInternalMetadata.xmlxml
MD5:E00F394FD5AF2A952CA1DE711F763496
SHA256:3D74731C545E2E92E37D16E79FA40379D0C83F97104309466AC30DFA1C1E1D5A
6800WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:4947F216D1E5162019849AEC16F72136
SHA256:9CAF94FE4DA2CEB347C6BACACA65742BCAC3BEA6B98BDD59786587A9EFEE24E3
6800WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6800WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER690E.tmp.dmpbinary
MD5:B10350953B6ECF366572901C549CD462
SHA256:9EB492D117B8356C050A75D79E03171963CC3682EF76A5888CBB2A0E503A8D88
6800WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:60DAF41E419EFC7BD0A94DA6C7B7C26C
SHA256:DB0A8B3CFDFD9A4A3B57FAC6B9F63DEB1CE6B287BE97941F2473D80A735AC587
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
35
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6528
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6528
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6264
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6264
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6800
WerFault.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6800
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6092
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.144:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.bing.com
  • 104.126.37.144
  • 104.126.37.153
  • 104.126.37.146
  • 104.126.37.155
  • 104.126.37.154
  • 104.126.37.147
  • 104.126.37.145
  • 104.126.37.139
  • 104.126.37.152
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.22
  • 40.126.32.76
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
mail.pgsu.co.id
  • 107.178.108.41
malicious
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info