Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:12
Static task
static1
Behavioral task
behavioral1
Sample
HALKBANK.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HALKBANK.exe
Resource
win10v2004-20220414-en
General
-
Target
HALKBANK.exe
-
Size
2.6MB
-
MD5
c291db2a12b8b6cac2a34c15f3ebd92e
-
SHA1
552ecf8af82f538b251e42f0ad3e1a45f7144887
-
SHA256
dc12d4cb1e8224bd26571c7ce1c557740851ac248f56a5e449494e55c0edd722
-
SHA512
6d63e75a2348659fff3d50062dcafef922bcb0385e148b5d93c61671134a639b51e491dbde4b3b18aed6adc87f24549b8cc1b42eb3b249ba7eb628b33f1f1392
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bunsadokum.com - Port:
587 - Username:
[email protected] - Password:
posta38Bunsa
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4776-130-0x0000000000E20000-0x00000000010BC000-memory.dmp family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger -
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4560-193-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 5 IoCs
Processes:
RegAsm.exefirefoxx.exeRegAsm.exefirefoxx.exeInstallUtil.exepid process 5028 RegAsm.exe 2520 firefoxx.exe 4636 RegAsm.exe 1820 firefoxx.exe 4560 InstallUtil.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HALKBANK.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation HALKBANK.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefoxx = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\firefoxx.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
HALKBANK.exefirefoxx.exeRegAsm.exedescription pid process target process PID 4776 set thread context of 5028 4776 HALKBANK.exe RegAsm.exe PID 2520 set thread context of 4636 2520 firefoxx.exe RegAsm.exe PID 4636 set thread context of 4560 4636 RegAsm.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3628 2520 WerFault.exe firefoxx.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exeRegAsm.exefirefoxx.exeInstallUtil.exepid process 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 5028 RegAsm.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 4776 HALKBANK.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 5028 RegAsm.exe 2520 firefoxx.exe 2520 firefoxx.exe 2520 firefoxx.exe 4636 RegAsm.exe 1820 firefoxx.exe 2520 firefoxx.exe 2520 firefoxx.exe 4636 RegAsm.exe 4636 RegAsm.exe 4560 InstallUtil.exe 4560 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exeRegAsm.exefirefoxx.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4776 HALKBANK.exe Token: SeDebugPrivilege 5028 RegAsm.exe Token: SeDebugPrivilege 2520 firefoxx.exe Token: SeDebugPrivilege 4636 RegAsm.exe Token: SeDebugPrivilege 1820 firefoxx.exe Token: SeDebugPrivilege 4560 InstallUtil.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
HALKBANK.execmd.exeRegAsm.exefirefoxx.exeRegAsm.exedescription pid process target process PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 5028 4776 HALKBANK.exe RegAsm.exe PID 4776 wrote to memory of 1812 4776 HALKBANK.exe cmd.exe PID 4776 wrote to memory of 1812 4776 HALKBANK.exe cmd.exe PID 4776 wrote to memory of 1812 4776 HALKBANK.exe cmd.exe PID 1812 wrote to memory of 4372 1812 cmd.exe reg.exe PID 1812 wrote to memory of 4372 1812 cmd.exe reg.exe PID 1812 wrote to memory of 4372 1812 cmd.exe reg.exe PID 5028 wrote to memory of 2520 5028 RegAsm.exe firefoxx.exe PID 5028 wrote to memory of 2520 5028 RegAsm.exe firefoxx.exe PID 5028 wrote to memory of 2520 5028 RegAsm.exe firefoxx.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 2520 wrote to memory of 4636 2520 firefoxx.exe RegAsm.exe PID 4776 wrote to memory of 1820 4776 HALKBANK.exe firefoxx.exe PID 4776 wrote to memory of 1820 4776 HALKBANK.exe firefoxx.exe PID 4776 wrote to memory of 1820 4776 HALKBANK.exe firefoxx.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe PID 4636 wrote to memory of 4560 4636 RegAsm.exe InstallUtil.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 12844⤵
- Program crash
PID:3628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Adds Run key to start application
PID:4372 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2520 -ip 25201⤵PID:3476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c2a3081353c47c81c743b974abbbb84c
SHA1d2eb69344b2c28506e1134cd278477bb72673242
SHA256f9fd57912c3aff8ff41751965a16532b60682103f3907fbb0d1d42a453eafbf8
SHA512fb59fddc7e0d258aeff65fbf622cb2032fb65e11f74c37a57e4dc4de9557a799e03cf355344605004e06b2c23f5b7e968ae825f36b5b65dd04fbb991850d5555
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
2.6MB
MD5c291db2a12b8b6cac2a34c15f3ebd92e
SHA1552ecf8af82f538b251e42f0ad3e1a45f7144887
SHA256dc12d4cb1e8224bd26571c7ce1c557740851ac248f56a5e449494e55c0edd722
SHA5126d63e75a2348659fff3d50062dcafef922bcb0385e148b5d93c61671134a639b51e491dbde4b3b18aed6adc87f24549b8cc1b42eb3b249ba7eb628b33f1f1392
-
Filesize
2.6MB
MD5c291db2a12b8b6cac2a34c15f3ebd92e
SHA1552ecf8af82f538b251e42f0ad3e1a45f7144887
SHA256dc12d4cb1e8224bd26571c7ce1c557740851ac248f56a5e449494e55c0edd722
SHA5126d63e75a2348659fff3d50062dcafef922bcb0385e148b5d93c61671134a639b51e491dbde4b3b18aed6adc87f24549b8cc1b42eb3b249ba7eb628b33f1f1392
-
Filesize
2.6MB
MD5c291db2a12b8b6cac2a34c15f3ebd92e
SHA1552ecf8af82f538b251e42f0ad3e1a45f7144887
SHA256dc12d4cb1e8224bd26571c7ce1c557740851ac248f56a5e449494e55c0edd722
SHA5126d63e75a2348659fff3d50062dcafef922bcb0385e148b5d93c61671134a639b51e491dbde4b3b18aed6adc87f24549b8cc1b42eb3b249ba7eb628b33f1f1392