analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

64764096-B173-1905-B039-AA3FEBD1A8B4.eml.zip

Full analysis: https://app.any.run/tasks/bec95e65-2ee8-4317-bef4-f9ae9b301523
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: October 20, 2020, 11:18:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
agenttesla
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

572E2667DAA27A5234EDD9399BA4A4DF

SHA1:

04924FACAF7D7CF57B87D379EE63EB2CA7DCA80F

SHA256:

EC4B0728C3699C4B2A1E15025B88EFB377EA66045A66D9ECD3CB4213D6FBAD03

SSDEEP:

24576:k0TeK0vX/eQM9IYPQX56GpdtpUgjIO1rlLhRCOnnLt:heLP/Y9Iqy5npUArlrPnR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MV Erlyne - discharge 26082mtns chrome ore.exe (PID: 2572)
      • MV Erlyne - discharge 26082mtns chrome ore.exe (PID: 2888)
    • AGENTTESLA was detected

      • MV Erlyne - discharge 26082mtns chrome ore.exe (PID: 2888)
    • Actions looks like stealing of personal data

      • MV Erlyne - discharge 26082mtns chrome ore.exe (PID: 2888)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2916)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2528)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2916)
    • Application launched itself

      • MV Erlyne - discharge 26082mtns chrome ore.exe (PID: 2572)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 2832)
    • Manual execution by user

      • OUTLOOK.EXE (PID: 2916)
      • WinRAR.exe (PID: 2528)
      • MV Erlyne - discharge 26082mtns chrome ore.exe (PID: 2572)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2916)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 64764096-B173-1905-B039-AA3FEBD1A8B4.eml
ZipUncompressedSize: 1074013
ZipCompressedSize: 826317
ZipCRC: 0x7d12c471
ZipModifyDate: 2020:10:12 09:32:26
ZipCompression: Deflated
ZipBitFlag: 0x0003
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs outlook.exe winrar.exe mv erlyne - discharge 26082mtns chrome ore.exe no specs #AGENTTESLA mv erlyne - discharge 26082mtns chrome ore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2832"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\64764096-B173-1905-B039-AA3FEBD1A8B4.eml.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2916"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\Desktop\64764096-B173-1905-B039-AA3FEBD1A8B4.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2528"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\MV Erlyne - discharge 26082mtns chrome ore.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2572"C:\Users\admin\Desktop\MV Erlyne - discharge 26082mtns chrome ore.exe" C:\Users\admin\Desktop\MV Erlyne - discharge 26082mtns chrome ore.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Toblerone
Exit code:
0
Version:
15.0.0.0
2888"{path}"C:\Users\admin\Desktop\MV Erlyne - discharge 26082mtns chrome ore.exe
MV Erlyne - discharge 26082mtns chrome ore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Toblerone
Version:
15.0.0.0
Total events
2 012
Read events
1 469
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
2
Text files
29
Unknown types
2

Dropped files

PID
Process
Filename
Type
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRF428.tmp.cvr
MD5:
SHA256:
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmpF63D.tmp
MD5:
SHA256:
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\IGR5GZO2\MV Erlyne - discharge 26082mtns chrome ore (2).rar\:Zone.Identifier:$DATA
MD5:
SHA256:
2832WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2832.7103\64764096-B173-1905-B039-AA3FEBD1A8B4.emleml
MD5:414C64AB5B4CD5CF9D3360325E8740B4
SHA256:97DD5DB49FB415F9B5E3DA31657A1D7B8BAAB97AC53BC304A6D887321BDF94B4
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:845F1501752B8F818598C1B74C64C134
SHA256:86D8427B17A77AD293C2FD55732F23D4FB2082EA14BCB6843E7FE597EB4E738F
2916OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:D88678E4F11F8583F5B6D7F6C8B7DCF8
SHA256:493C767F9D14183B408C14E0129B550BBF5B54E3B262DB50D96AB1D8178EFD59
2528WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2528.9377\MV Erlyne - discharge 26082mtns chrome ore.exeexecutable
MD5:473F4BF6D9531BAD471159DF3AB4804E
SHA256:EB22D2E32A7190AF10B92105DB2A1132EFC1EF4E44E61DB4B2FBF17C6CCCF19A
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\IGR5GZO2\MV Erlyne - discharge 26082mtns chrome ore (2).rarcompressed
MD5:6E96933A17BE0E8AC29ABA57DE88B4A7
SHA256:59ADF80A86E64044A4D1B51C75DCF6FFD80F73AAA3235D404C5DF44AEE7170B0
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3C070C5.datimage
MD5:F0DDFA953D49D316953BC1020DD72FA4
SHA256:6E70DF019EE50167FEAFD0FD05FC1B33E9AF332A6A6E5FB02D9D12777A6E22F8
2916OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:C07E0BCD6C1F766B0C4F27073097D964
SHA256:BEF74969E93C3886C5ECC292D3BCB0A6E7AF32930DD1CB322B15BDB05D1816EC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2916
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2888
MV Erlyne - discharge 26082mtns chrome ore.exe
136.243.28.2:587
mail.provil.gr
Hetzner Online GmbH
DE
malicious
2916
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
mail.provil.gr
  • 136.243.28.2
malicious

Threats

PID
Process
Class
Message
2888
MV Erlyne - discharge 26082mtns chrome ore.exe
A Network Trojan was detected
SPYWARE [PTsecurity] AgentTesla Exfiltration
No debug info