analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1-1hSXc8-0003a7-Bs.eml

Full analysis: https://app.any.run/tasks/96231e3f-4505-4ae8-8d2d-be0cc29421c5
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 20, 2019, 07:18:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
agenttesla
evasion
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, UTF-8 Unicode text, with very long lines
MD5:

5757936EA230EF4C0EF9204329A0B17F

SHA1:

88DBA1DCA8A37CCFD7DEE5DCF0D5B59A256F1433

SHA256:

DA54D21C3A1D16A732332718F42B7DD8D431693A5B2E854C839A04AE6FE5DD0F

SSDEEP:

12288:ovEYZ3gyW0RDJZ+sikh3v2AmktirfTEJJRcq9qEjXkSM:o3VtD/Xh3EqJWq4sTM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • img_YT2947-Sample.com (PID: 2156)
      • filename.com (PID: 4020)
      • filename.com (PID: 1888)
      • img_YT2947-Sample.com (PID: 4068)
      • filename.com (PID: 3248)
      • img_YT2947-Sample.com (PID: 3692)
      • filename.com (PID: 3540)
      • filename.com (PID: 1808)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 1848)
      • WScript.exe (PID: 3704)
      • WScript.exe (PID: 3656)
    • Actions looks like stealing of personal data

      • filename.com (PID: 1888)
      • filename.com (PID: 1808)
    • AGENTTESLA was detected

      • filename.com (PID: 1888)
      • filename.com (PID: 1808)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3968)
    • Starts application with an unusual extension

      • WinRAR.exe (PID: 3332)
      • img_YT2947-Sample.com (PID: 2156)
      • filename.com (PID: 4020)
      • img_YT2947-Sample.com (PID: 4068)
      • img_YT2947-Sample.com (PID: 3692)
      • filename.com (PID: 3540)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3332)
      • img_YT2947-Sample.com (PID: 2156)
      • WinRAR.exe (PID: 3852)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3968)
    • Starts itself from another location

      • img_YT2947-Sample.com (PID: 2156)
      • img_YT2947-Sample.com (PID: 4068)
      • img_YT2947-Sample.com (PID: 3692)
    • Executes scripts

      • img_YT2947-Sample.com (PID: 2156)
      • img_YT2947-Sample.com (PID: 4068)
      • img_YT2947-Sample.com (PID: 3692)
    • Application launched itself

      • filename.com (PID: 4020)
      • filename.com (PID: 3540)
    • Loads DLL from Mozilla Firefox

      • filename.com (PID: 1888)
      • filename.com (PID: 1808)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 1784)
    • Checks for external IP

      • filename.com (PID: 1808)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 3852)
      • img_YT2947-Sample.com (PID: 4068)
      • chrome.exe (PID: 1784)
      • img_YT2947-Sample.com (PID: 3692)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3968)
    • Application was crashed

      • filename.com (PID: 1888)
    • Dropped object may contain Bitcoin addresses

      • chrome.exe (PID: 1784)
    • Application launched itself

      • chrome.exe (PID: 1784)
    • Reads settings of System Certificates

      • chrome.exe (PID: 1784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
39
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start outlook.exe winrar.exe img_yt2947-sample.com wscript.exe filename.com no specs #AGENTTESLA filename.com winrar.exe img_yt2947-sample.com no specs wscript.exe filename.com no specs img_yt2947-sample.com no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wscript.exe filename.com no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs dw20.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs #AGENTTESLA filename.com chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3968"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\1-1hSXc8-0003a7-Bs.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
3332"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\F30QWXZU\img_YT2947-Sample.rar"C:\Program Files\WinRAR\WinRAR.exe
OUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2156"C:\Users\admin\AppData\Local\Temp\Rar$DIa3332.28695\img_YT2947-Sample.com" C:\Users\admin\AppData\Local\Temp\Rar$DIa3332.28695\img_YT2947-Sample.com
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
2.08.0009
1848"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
img_YT2947-Sample.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
4020"C:\Users\admin\AppData\Local\Temp\subfolder\filename.com" C:\Users\admin\AppData\Local\Temp\subfolder\filename.comimg_YT2947-Sample.com
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Version:
2.08.0009
1888C:\Users\admin\AppData\Local\Temp\subfolder\filename.com" C:\Users\admin\AppData\Local\Temp\subfolder\filename.com
filename.com
User:
admin
Integrity Level:
MEDIUM
Exit code:
2147943401
Version:
2.08.0009
3852"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\img_YT2947-Sample.rar" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
1
Version:
5.60.0
4068"C:\Users\admin\Desktop\img_YT2947-Sample.com" C:\Users\admin\Desktop\img_YT2947-Sample.comexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
2.08.0009
3704"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
img_YT2947-Sample.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3248"C:\Users\admin\AppData\Local\Temp\subfolder\filename.com" C:\Users\admin\AppData\Local\Temp\subfolder\filename.comimg_YT2947-Sample.com
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Version:
2.08.0009
Total events
4 994
Read events
4 247
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
241
Text files
236
Unknown types
7

Dropped files

PID
Process
Filename
Type
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVREE16.tmp.cvr
MD5:
SHA256:
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmpF0E6.tmp
MD5:
SHA256:
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\F30QWXZU\img_YT2947-Sample (2).rar\:Zone.Identifier:$DATA
MD5:
SHA256:
3968OUTLOOK.EXEC:\Users\admin\Desktop\img_YT2947-Sample.rar\:Zone.Identifier:$DATA
MD5:
SHA256:
3968OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:FC575686875032779A32F49F9345DAD4
SHA256:2E449F5F9E7D449A45786DC1D21A64D28D6133302042731663B01C9B81D1BAC0
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E9E0D9DF-15F8-4F5D-B257-B9F5A3453780}.tmp
MD5:
SHA256:
3332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3332.28695\img_YT2947-Sample.comexecutable
MD5:8784F580EED656338F43BD61EAF3AA41
SHA256:7BAA5B65A3DCE51160E0C87568FB211CD59CC6F7691B87C22CA5AE8C984E121D
2156img_YT2947-Sample.comC:\Users\admin\AppData\Local\Temp\~DFBF59C43B40F99CAC.TMPbinary
MD5:BE0E66F599857FB3CCCB6A40AF03F963
SHA256:821CB16B3EDD94042A51F24E706DEBBB6E67691946A16804ECAC7083A941B48E
2156img_YT2947-Sample.comC:\Users\admin\AppData\Local\Temp\subfolder\filename.vbstext
MD5:4106030301AFC182774C859BA62B9528
SHA256:199978B0224A863FA02657CD8B5DECD4EC7CCB6C0A6A0C26F8FEEDA8757D18E9
3968OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:48DD6CAE43CE26B992C35799FCD76898
SHA256:7BFE1F3691E2B4FB4D61FBF5E9F7782FBE49DA1342DBD32201C2CC8E540DBD1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
31
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3968
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
1784
chrome.exe
GET
302
216.239.34.21:80
http://virustotal.com/
US
whitelisted
1808
filename.com
GET
200
18.211.215.84:80
http://checkip.amazonaws.com/
US
text
12 b
shared
1784
chrome.exe
GET
302
172.217.22.46:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvMjJlQUFXRC12Ny1ldUFnMXF3SDlXZDlFZw/7319.128.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
502 b
whitelisted
1784
chrome.exe
GET
200
74.125.11.198:80
http://r1---sn-hgn7yn7s.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvMjJlQUFXRC12Ny1ldUFnMXF3SDlXZDlFZw/7319.128.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=95.174.64.2&mm=28&mn=sn-hgn7yn7s&ms=nvh&mt=1558336760&mv=m&pl=24&shardbypass=yes
US
crx
842 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1888
filename.com
198.54.116.63:26
mail.granthost14.icu
Namecheap, Inc.
US
malicious
1784
chrome.exe
172.217.22.67:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
1784
chrome.exe
216.58.205.238:443
clients1.google.com
Google Inc.
US
whitelisted
1784
chrome.exe
172.217.22.13:443
accounts.google.com
Google Inc.
US
whitelisted
1784
chrome.exe
172.217.18.99:443
www.gstatic.com
Google Inc.
US
whitelisted
1784
chrome.exe
172.217.16.206:443
apis.google.com
Google Inc.
US
whitelisted
1784
chrome.exe
172.217.22.35:443
www.google.com.ua
Google Inc.
US
whitelisted
3968
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
1784
chrome.exe
216.58.210.3:443
ssl.gstatic.com
Google Inc.
US
whitelisted
1784
chrome.exe
172.217.22.33:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
mail.granthost14.icu
  • 198.54.116.63
malicious
www.google.com.ua
  • 172.217.22.35
whitelisted
clientservices.googleapis.com
  • 172.217.22.67
whitelisted
accounts.google.com
  • 172.217.22.13
shared
clients1.google.com
  • 216.58.205.238
whitelisted
ssl.gstatic.com
  • 216.58.210.3
whitelisted
www.gstatic.com
  • 172.217.18.99
whitelisted
apis.google.com
  • 172.217.16.206
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
1888
filename.com
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Spy.Keylogger.AgentTesla Exfiltration by SMTP
1808
filename.com
A Network Trojan was detected
MALWARE [PTsecurity] AgentTesla IP Check
1808
filename.com
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-Spy.Keylogger.AgentTesla Exfiltration by SMTP
4 ETPRO signatures available at the full report
No debug info