analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

4350041907_docx.gz

Full analysis: https://app.any.run/tasks/3c7d440f-e429-4972-bc93-06cae29b1d62
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: July 17, 2019, 18:14:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
keylogger
agenttesla
Indicators:
MIME: application/gzip
File info: gzip compressed data, was "4350041907_docx.exe", last modified: Tue Jul 16 10:13:55 2019, max speed, from FAT filesystem (MS-DOS, OS/2, NT)
MD5:

5B420F71AFE117BD95E62A540DA9F9C7

SHA1:

4408695BD97C99A5D394CAEFC049571877E8428C

SHA256:

C6E1D906594F8F2F1390F0D134158639731DAA4692169E2952F71259119241B7

SSDEEP:

6144:ntNHRmknL/a4SyTcelOogMzHMjvKRYt6Q8xEyvstFHlrz6BQ1JTwPYabS7MEL:rrvwbAzHiKet6Q8uyktFB+BQ1uPYabSp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 4350041907_docx.exe (PID: 3080)
      • 4350041907_docx.exe (PID: 3236)
      • 4350041907_docx.exe (PID: 3240)
      • 4350041907_docx.exe (PID: 1516)
      • 4350041907_docx.exe (PID: 3640)
      • 4350041907_docx.exe (PID: 3824)
      • 4350041907_docx.exe (PID: 1944)
      • 4350041907_docx.exe (PID: 1000)
    • AGENTTESLA was detected

      • 4350041907_docx.exe (PID: 1944)
    • Actions looks like stealing of personal data

      • 4350041907_docx.exe (PID: 1944)
  • SUSPICIOUS

    • Application launched itself

      • 4350041907_docx.exe (PID: 1516)
      • 4350041907_docx.exe (PID: 3824)
      • 4350041907_docx.exe (PID: 3080)
      • 4350041907_docx.exe (PID: 3640)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3528)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

ArchivedFileName: 4350041907_docx.exe
OperatingSystem: FAT filesystem (MS-DOS, OS/2, NT/Win32)
ExtraFlags: Fastest Algorithm
ModifyDate: 2019:07:16 12:13:55+02:00
Flags: FileName
Compression: Deflated
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
9
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start winrar.exe 4350041907_docx.exe no specs 4350041907_docx.exe no specs 4350041907_docx.exe no specs #AGENTTESLA 4350041907_docx.exe 4350041907_docx.exe no specs 4350041907_docx.exe no specs 4350041907_docx.exe no specs 4350041907_docx.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3528"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\4350041907_docx.gz"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3080"C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27064\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27064\4350041907_docx.exeWinRAR.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
0
Version:
1.06.0005
3640"C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27097\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27097\4350041907_docx.exeWinRAR.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
0
Version:
1.06.0005
1000C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27097\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27097\4350041907_docx.exe4350041907_docx.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
4294967295
Version:
1.06.0005
1944C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27064\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27064\4350041907_docx.exe
4350041907_docx.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Version:
1.06.0005
3824"C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28495\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28495\4350041907_docx.exeWinRAR.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
0
Version:
1.06.0005
1516"C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28514\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28514\4350041907_docx.exeWinRAR.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
0
Version:
1.06.0005
3240C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28514\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28514\4350041907_docx.exe4350041907_docx.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
4294967295
Version:
1.06.0005
3236C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28495\4350041907_docx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28495\4350041907_docx.exe4350041907_docx.exe
User:
admin
Company:
INTERLAPS10
Integrity Level:
MEDIUM
Description:
percomorphous3
Exit code:
4294967295
Version:
1.06.0005
Total events
488
Read events
476
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
0
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3528WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27064\4350041907_docx.exeexecutable
MD5:1F619BCFD7AB85CDCB7ECD25721F8B47
SHA256:C27A0687C2779D27A404A294306B96FFD4022766027240D0E1DF7A94E33637DF
3528WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3528.27097\4350041907_docx.exeexecutable
MD5:1F619BCFD7AB85CDCB7ECD25721F8B47
SHA256:C27A0687C2779D27A404A294306B96FFD4022766027240D0E1DF7A94E33637DF
19444350041907_docx.exeC:\Users\admin\AppData\Local\Temp\636989877019910000_36c1bc50-5744-4907-ac7e-c7b873176753.dbsqlite
MD5:0B3C43342CE2A99318AA0FE9E531C57B
SHA256:0CCB4915E00390685621DA3D75EBFD5EDADC94155A79C66415A7F4E9763D71B8
3528WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28514\4350041907_docx.exeexecutable
MD5:1F619BCFD7AB85CDCB7ECD25721F8B47
SHA256:C27A0687C2779D27A404A294306B96FFD4022766027240D0E1DF7A94E33637DF
3528WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3528.28495\4350041907_docx.exeexecutable
MD5:1F619BCFD7AB85CDCB7ECD25721F8B47
SHA256:C27A0687C2779D27A404A294306B96FFD4022766027240D0E1DF7A94E33637DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1944
4350041907_docx.exe
46.21.144.100:587
server1.monovm.com
Swiftway Sp. z o.o.
NL
malicious

DNS requests

Domain
IP
Reputation
server1.monovm.com
  • 46.21.144.100
unknown

Threats

PID
Process
Class
Message
1944
4350041907_docx.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
No debug info