Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 12:22
Static task
static1
Behavioral task
behavioral1
Sample
T. HALK BANKASI A.S.exe
Resource
win7
Behavioral task
behavioral2
Sample
T. HALK BANKASI A.S.exe
Resource
win10v200430
General
-
Target
T. HALK BANKASI A.S.exe
-
Size
489KB
-
MD5
be55dd6e2a8fb0d8e12fa824aa57d8c2
-
SHA1
cbab35a49fa6c4597ccbcf8ff19b3a880457ff8d
-
SHA256
d25f524faf11aee50288503f06409544fe07433df48455e89b2376de13255ff5
-
SHA512
75f8f91a5abe004aff29a15d21616580c61aac677a04cfee9893a9475242f33d25212bc432c53d5f4b4c38a85366fbe3493b897cee0824b4867111cf9f0d7930
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Hunter$#@145722
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1904-14-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1904-15-0x00000000004479FE-mapping.dmp family_agenttesla behavioral1/memory/1904-17-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1904-18-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 600 winservie.exe 1904 InstallUtil.exe -
Loads dropped DLL 2 IoCs
pid Process 1072 T. HALK BANKASI A.S.exe 600 winservie.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\winservie = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\winservie.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 600 set thread context of 1904 600 winservie.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1072 T. HALK BANKASI A.S.exe 1072 T. HALK BANKASI A.S.exe 1072 T. HALK BANKASI A.S.exe 600 winservie.exe 600 winservie.exe 600 winservie.exe 1904 InstallUtil.exe 1904 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1072 T. HALK BANKASI A.S.exe Token: SeDebugPrivilege 600 winservie.exe Token: SeDebugPrivilege 1904 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1904 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1476 1072 T. HALK BANKASI A.S.exe 24 PID 1072 wrote to memory of 1476 1072 T. HALK BANKASI A.S.exe 24 PID 1072 wrote to memory of 1476 1072 T. HALK BANKASI A.S.exe 24 PID 1072 wrote to memory of 1476 1072 T. HALK BANKASI A.S.exe 24 PID 1476 wrote to memory of 292 1476 cmd.exe 26 PID 1476 wrote to memory of 292 1476 cmd.exe 26 PID 1476 wrote to memory of 292 1476 cmd.exe 26 PID 1476 wrote to memory of 292 1476 cmd.exe 26 PID 1072 wrote to memory of 600 1072 T. HALK BANKASI A.S.exe 27 PID 1072 wrote to memory of 600 1072 T. HALK BANKASI A.S.exe 27 PID 1072 wrote to memory of 600 1072 T. HALK BANKASI A.S.exe 27 PID 1072 wrote to memory of 600 1072 T. HALK BANKASI A.S.exe 27 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30 PID 600 wrote to memory of 1904 600 winservie.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\T. HALK BANKASI A.S.exe"C:\Users\Admin\AppData\Local\Temp\T. HALK BANKASI A.S.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v winservie /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\winservie.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v winservie /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\winservie.exe"3⤵
- Adds Run key to start application
PID:292
-
-
-
C:\Users\Admin\AppData\Roaming\winservie.exe"C:\Users\Admin\AppData\Roaming\winservie.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1904
-
-