Analysis
-
max time kernel
4294180s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
08-03-2022 14:12
Static task
static1
Behavioral task
behavioral1
Sample
Siparis onayi eklendi.exe
Resource
win7-20220223-en
General
-
Target
Siparis onayi eklendi.exe
-
Size
816KB
-
MD5
a6d1e703b380b1e716889f07cc087760
-
SHA1
f8abf6e3ecb0c332ace24b7ccdfcdfa50b0e968e
-
SHA256
50dba2f344aa086c034ce37a3aea4e70629a0eeaa8c59b2b6f6395b4969b7dc1
-
SHA512
658e5b8f08b3a0d4b0ef999386a4a7258d5630d3995049dd8cdd48c7992d9c201f38fc1b915817708a654a3c600dd38b602292dd4b58a51e49093f9ee3800f72
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Siparis onayi eklendi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\Itvjech = "C:\\Users\\Public\\hcejvtI.url" Siparis onayi eklendi.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1584 300 WerFault.exe logagent.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1720 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
Siparis onayi eklendi.exelogagent.execmd.execmd.exenet.exedescription pid process target process PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 300 1920 Siparis onayi eklendi.exe logagent.exe PID 1920 wrote to memory of 2016 1920 Siparis onayi eklendi.exe cmd.exe PID 1920 wrote to memory of 2016 1920 Siparis onayi eklendi.exe cmd.exe PID 1920 wrote to memory of 2016 1920 Siparis onayi eklendi.exe cmd.exe PID 1920 wrote to memory of 2016 1920 Siparis onayi eklendi.exe cmd.exe PID 300 wrote to memory of 1584 300 logagent.exe WerFault.exe PID 300 wrote to memory of 1584 300 logagent.exe WerFault.exe PID 300 wrote to memory of 1584 300 logagent.exe WerFault.exe PID 300 wrote to memory of 1584 300 logagent.exe WerFault.exe PID 2016 wrote to memory of 1760 2016 cmd.exe cmd.exe PID 2016 wrote to memory of 1760 2016 cmd.exe cmd.exe PID 2016 wrote to memory of 1760 2016 cmd.exe cmd.exe PID 2016 wrote to memory of 1760 2016 cmd.exe cmd.exe PID 1760 wrote to memory of 1808 1760 cmd.exe net.exe PID 1760 wrote to memory of 1808 1760 cmd.exe net.exe PID 1760 wrote to memory of 1808 1760 cmd.exe net.exe PID 1760 wrote to memory of 1808 1760 cmd.exe net.exe PID 1808 wrote to memory of 1904 1808 net.exe net1.exe PID 1808 wrote to memory of 1904 1808 net.exe net1.exe PID 1808 wrote to memory of 1904 1808 net.exe net1.exe PID 1808 wrote to memory of 1904 1808 net.exe net1.exe PID 1760 wrote to memory of 1720 1760 cmd.exe powershell.exe PID 1760 wrote to memory of 1720 1760 cmd.exe powershell.exe PID 1760 wrote to memory of 1720 1760 cmd.exe powershell.exe PID 1760 wrote to memory of 1720 1760 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Siparis onayi eklendi.exe"C:\Users\Admin\AppData\Local\Temp\Siparis onayi eklendi.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\logagent.exeC:\Windows\System32\logagent.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 1403⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Itvjecht.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Public\ItvjechO.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet session4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Cdex.batMD5
213c60adf1c9ef88dc3c9b2d579959d2
SHA1e4d2ad7b22b1a8b5b1f7a702b303c7364b0ee021
SHA25637c59c8398279916cfce45f8c5e3431058248f5e3bef4d9f5c0f44a7d564f82e
SHA512fe897d9caa306b0e761b2fd61bb5dc32a53bfaad1ce767c6860af4e3ad59c8f3257228a6e1072dab0f990cb51c59c648084ba419ac6bc5c0a99bdffa569217b7
-
C:\Users\Public\ItvjechO.batMD5
df48c09f243ebcc8a165f77a1c2bf889
SHA1455f7db0adcc2a58d006f1630fb0bd55cd868c07
SHA2564ef9821678da07138c19405387f3fb95e409fbd461c7b8d847c05075facd63ca
SHA512735838c7cca953697ded48adfcd037b7f198072a8962f5940ce12e1bb1c7dd8c1f257a829276f5f5456f776f5bd13342222dd6e0dfc8f18a23f464f2c8d8f1cc
-
C:\Users\Public\Itvjecht.batMD5
0a5c3b74c05c78f53183728ca1806768
SHA1793e6a7f3ea1aa0583111244c106e321cc0870e2
SHA256134d7af0771052e1c15f60b5bb32660709a56767037811f12703ca5cad1c40b1
SHA5129538698e0501c4e9e790e0da00cd6020ac1e776ebe12ef1c7c7478cf7e69a1477f31c61a03003d1d6fb7e7aa144d285fa5cbc8d41547cef490ce7925b230c114
-
memory/300-58-0x0000000072480000-0x00000000724AE000-memory.dmpFilesize
184KB
-
memory/300-60-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1720-69-0x0000000072E30000-0x00000000733DB000-memory.dmpFilesize
5.7MB
-
memory/1720-70-0x0000000002380000-0x0000000002FCA000-memory.dmpFilesize
12.3MB
-
memory/1720-71-0x0000000072E30000-0x00000000733DB000-memory.dmpFilesize
5.7MB
-
memory/1720-72-0x0000000002380000-0x0000000002FCA000-memory.dmpFilesize
12.3MB
-
memory/1920-54-0x00000000757C1000-0x00000000757C3000-memory.dmpFilesize
8KB
-
memory/1920-56-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1920-64-0x0000000004906000-0x0000000004907000-memory.dmpFilesize
4KB