Analysis
-
max time kernel
129s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
Hesap hareketleriniz.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Hesap hareketleriniz.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
Hesap hareketleriniz.exe
-
Size
1.2MB
-
MD5
a11cb2b444cb1a165e23fc97fe1304cb
-
SHA1
65dbfdd4da931bd749f99b5a3c766baa61012e6c
-
SHA256
0329eea7ab274894de8d7f91105cdea35e86e45e73c9c4411c5fae7cd564832c
-
SHA512
3f217cac3d11bf3c4ef5e5df824ee0fe25b7f20b549e16c046211cc16914c51480397b1923db65cbe03beeec2e56c55a57602dc1fb05f79bbb021a0107621bd1
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eee.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3180 set thread context of 2232 3180 Hesap hareketleriniz.exe 81 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3180 Hesap hareketleriniz.exe 3180 Hesap hareketleriniz.exe 4460 powershell.exe 4460 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3180 Hesap hareketleriniz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4920 3180 Hesap hareketleriniz.exe 80 PID 3180 wrote to memory of 4920 3180 Hesap hareketleriniz.exe 80 PID 3180 wrote to memory of 4920 3180 Hesap hareketleriniz.exe 80 PID 3180 wrote to memory of 4920 3180 Hesap hareketleriniz.exe 80 PID 3180 wrote to memory of 4920 3180 Hesap hareketleriniz.exe 80 PID 3180 wrote to memory of 2232 3180 Hesap hareketleriniz.exe 81 PID 3180 wrote to memory of 2232 3180 Hesap hareketleriniz.exe 81 PID 3180 wrote to memory of 2232 3180 Hesap hareketleriniz.exe 81 PID 2232 wrote to memory of 4556 2232 Hesap hareketleriniz.exe 87 PID 2232 wrote to memory of 4556 2232 Hesap hareketleriniz.exe 87 PID 2232 wrote to memory of 4556 2232 Hesap hareketleriniz.exe 87 PID 4556 wrote to memory of 4460 4556 cmd.exe 90 PID 4556 wrote to memory of 4460 4556 cmd.exe 90 PID 4556 wrote to memory of 4460 4556 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-