File name:

SecuriteInfo.com.Win32.CrypterX-gen.13163.28616

Full analysis: https://app.any.run/tasks/a287370f-22e8-43ae-9969-9ec777617cb6
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: December 23, 2023, 03:17:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
stealer
agenttesla
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

D7D68715B40A545257996385F02B50C6

SHA1:

80C293EBDCD1225B80099350FB6B033834E5A4E7

SHA256:

D81B20900232D066246690122705B147CF6DA679F527C95D015EEFE9053DC25A

SSDEEP:

49152:sBdJ5Kqn3I3I+PonK93Y9tSmIb0yxxqjzD9fHYWv4:sBdX1Y3INK93Ym+4gjzD9fYh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AGENTTESLA has been detected (SURICATA)

      • RegAsm.exe (PID: 2600)
    • Steals credentials from Web Browsers

      • RegAsm.exe (PID: 2600)
    • Connects to the CnC server

      • RegAsm.exe (PID: 2600)
    • Actions looks like stealing of personal data

      • RegAsm.exe (PID: 2600)
  • SUSPICIOUS

    • Reads the Internet Settings

      • RegAsm.exe (PID: 2600)
      • SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe (PID: 2740)
    • Accesses Microsoft Outlook profiles

      • RegAsm.exe (PID: 2600)
    • Connects to unusual port

      • RegAsm.exe (PID: 2600)
    • Connects to FTP

      • RegAsm.exe (PID: 2600)
  • INFO

    • Checks supported languages

      • SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe (PID: 2740)
      • RegAsm.exe (PID: 2600)
    • Checks proxy server information

      • SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe (PID: 2740)
    • Reads the computer name

      • RegAsm.exe (PID: 2600)
      • SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe (PID: 2740)
    • Reads the machine GUID from the registry

      • RegAsm.exe (PID: 2600)
      • SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe (PID: 2740)
    • Reads Environment values

      • RegAsm.exe (PID: 2600)
    • Drops the executable file immediately after the start

      • SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe (PID: 2740)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2002:08:20 21:39:41+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 1065472
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x1060de
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.10.13.16
ProductVersionNumber: 6.10.13.16
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: IA78CBIE33J=>;2B
CompanyName: D=8=ED?@;CCEI8;<A:E6J
FileDescription: =@EFB=:JFBF5C8C6
FileVersion: 6.10.13.16
InternalName: PACKPAY.exe
LegalCopyright: Copyright © 2009 D=8=ED?@;CCEI8;<A:E6J
OriginalFileName: PACKPAY.exe
ProductName: =@EFB=:JFBF5C8C6
ProductVersion: 6.10.13.16
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.win32.crypterx-gen.13163.28616.exe no specs #AGENTTESLA regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
2600"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
2740"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exeexplorer.exe
User:
admin
Company:
D=8=ED?@;CCEI8;<A:E6J
Integrity Level:
MEDIUM
Description:
=@EFB=:JFBF5C8C6
Exit code:
0
Version:
6.10.13.16
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.crypterx-gen.13163.28616.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
Total events
746
Read events
744
Write events
2
Delete events
0

Modification events

(PID) Process:(2740) SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2740) SecuriteInfo.com.Win32.CrypterX-gen.13163.28616.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C5000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
5

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
352
svchost.exe
224.0.0.252:5355
unknown
1220
svchost.exe
239.255.255.250:3702
whitelisted
2600
RegAsm.exe
188.241.222.22:21
ftp.experthvac.ro
GTS Telecom SRL
RO
unknown
2600
RegAsm.exe
188.241.222.22:36685
ftp.experthvac.ro
GTS Telecom SRL
RO
unknown

DNS requests

Domain
IP
Reputation
ftp.experthvac.ro
  • 188.241.222.22
unknown

Threats

PID
Process
Class
Message
2600
RegAsm.exe
A Network Trojan was detected
ET MALWARE AgentTesla Exfil via FTP
2600
RegAsm.exe
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt
2600
RegAsm.exe
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt
2 ETPRO signatures available at the full report
No debug info