Analysis
-
max time kernel
113s -
max time network
155s -
platform
windows7_x64 -
resource
win7 -
submitted
10/07/2020, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi000001,pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
hesaphareketi000001,pdf.exe
Resource
win10v200430
General
-
Target
hesaphareketi000001,pdf.exe
-
Size
2.9MB
-
MD5
62365690663bb84166207a981d124d64
-
SHA1
35a0d45093ab7d5e6acc22b0f1b1ee0eaf38da26
-
SHA256
d90041e6b2a7deca5936829d8a2f6b9c190abcab6c81c3a99b22d41ed6fffbb0
-
SHA512
2b35cbbe45a125f373d4f57b1184e12ab88c4cd6c76d51bdc4f928a89bdf324eb4cd036fe9df22c69858bd83d9bfd07b012630ea7ebccbb877373f3c235b1135
Malware Config
Extracted
C:\Users\Admin\AppData\Local\E2C1E8F1FA\Log.txt
masslogger
Extracted
agenttesla
Protocol: smtp- Host:
mail.cappac.com.tr - Port:
587 - Username:
[email protected] - Password:
aTlcLVD6nhEE
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 7 IoCs
resource yara_rule behavioral1/files/0x00040000000131ae-3.dat family_masslogger behavioral1/files/0x00040000000131ae-5.dat family_masslogger behavioral1/files/0x00040000000131ae-6.dat family_masslogger behavioral1/memory/1108-20-0x0000000000400000-0x000000000049A000-memory.dmp family_masslogger behavioral1/memory/1108-21-0x000000000049419E-mapping.dmp family_masslogger behavioral1/memory/1108-23-0x0000000000400000-0x000000000049A000-memory.dmp family_masslogger behavioral1/memory/1108-24-0x0000000000400000-0x000000000049A000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1840-10-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1840-11-0x000000000044712E-mapping.dmp family_agenttesla behavioral1/memory/1840-13-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1840-14-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 3 IoCs
pid Process 932 chromee.exe 1840 InstallUtil.exe 1108 InstallUtil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Control Panel\International\Geo\Nation InstallUtil.exe -
Loads dropped DLL 3 IoCs
pid Process 316 hesaphareketi000001,pdf.exe 316 hesaphareketi000001,pdf.exe 932 chromee.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\chromee = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chromee.exe" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 316 set thread context of 1840 316 hesaphareketi000001,pdf.exe 28 PID 932 set thread context of 1108 932 chromee.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 316 hesaphareketi000001,pdf.exe 316 hesaphareketi000001,pdf.exe 316 hesaphareketi000001,pdf.exe 932 chromee.exe 1840 InstallUtil.exe 1840 InstallUtil.exe 932 chromee.exe 932 chromee.exe 1108 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 316 hesaphareketi000001,pdf.exe Token: SeDebugPrivilege 932 chromee.exe Token: SeDebugPrivilege 1840 InstallUtil.exe Token: SeDebugPrivilege 1108 InstallUtil.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 316 wrote to memory of 932 316 hesaphareketi000001,pdf.exe 24 PID 316 wrote to memory of 932 316 hesaphareketi000001,pdf.exe 24 PID 316 wrote to memory of 932 316 hesaphareketi000001,pdf.exe 24 PID 316 wrote to memory of 932 316 hesaphareketi000001,pdf.exe 24 PID 316 wrote to memory of 1052 316 hesaphareketi000001,pdf.exe 25 PID 316 wrote to memory of 1052 316 hesaphareketi000001,pdf.exe 25 PID 316 wrote to memory of 1052 316 hesaphareketi000001,pdf.exe 25 PID 316 wrote to memory of 1052 316 hesaphareketi000001,pdf.exe 25 PID 1052 wrote to memory of 1700 1052 cmd.exe 27 PID 1052 wrote to memory of 1700 1052 cmd.exe 27 PID 1052 wrote to memory of 1700 1052 cmd.exe 27 PID 1052 wrote to memory of 1700 1052 cmd.exe 27 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 316 wrote to memory of 1840 316 hesaphareketi000001,pdf.exe 28 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32 PID 932 wrote to memory of 1108 932 chromee.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi000001,pdf.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi000001,pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"3⤵
- Adds Run key to start application
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-