Analysis
-
max time kernel
184s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:52
Static task
static1
Behavioral task
behavioral1
Sample
HALKBANK.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HALKBANK.exe
Resource
win10v2004-20220414-en
General
-
Target
HALKBANK.exe
-
Size
2.6MB
-
MD5
9b3462c82f69fbcc99426a93e4234b4f
-
SHA1
2becef6e493a7e067ee02fcce536c1f2dcc8f5f3
-
SHA256
0559341de926b16d11ab2ae2516720bad55f44a16d1cdfaf4a06437d54374612
-
SHA512
05116b5ef4aa0aa3a1a677f5dcb56904ec479470d0b29aa02af0a984d080b1caf6229c949a760bcd2131d871756f9d3a9c32df26d64e6e15f8da561018189921
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bunsadokum.com - Port:
587 - Username:
[email protected] - Password:
posta38Bunsa
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3960-130-0x0000000000820000-0x0000000000ABA000-memory.dmp family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger -
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/876-192-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 5 IoCs
Processes:
RegAsm.exefirefoxx.exefirefoxx.exeRegAsm.exeInstallUtil.exepid process 4404 RegAsm.exe 768 firefoxx.exe 4300 firefoxx.exe 4848 RegAsm.exe 876 InstallUtil.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HALKBANK.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation HALKBANK.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefoxx = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\firefoxx.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
HALKBANK.exefirefoxx.exeRegAsm.exedescription pid process target process PID 3960 set thread context of 4404 3960 HALKBANK.exe RegAsm.exe PID 4300 set thread context of 4848 4300 firefoxx.exe RegAsm.exe PID 4848 set thread context of 876 4848 RegAsm.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4532 4300 WerFault.exe firefoxx.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exefirefoxx.exeRegAsm.exeInstallUtil.exepid process 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 4404 RegAsm.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 3960 HALKBANK.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 4404 RegAsm.exe 768 firefoxx.exe 4300 firefoxx.exe 4300 firefoxx.exe 4300 firefoxx.exe 4848 RegAsm.exe 4300 firefoxx.exe 4300 firefoxx.exe 4848 RegAsm.exe 4848 RegAsm.exe 876 InstallUtil.exe 876 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exefirefoxx.exeRegAsm.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 3960 HALKBANK.exe Token: SeDebugPrivilege 4404 RegAsm.exe Token: SeDebugPrivilege 768 firefoxx.exe Token: SeDebugPrivilege 4300 firefoxx.exe Token: SeDebugPrivilege 4848 RegAsm.exe Token: SeDebugPrivilege 876 InstallUtil.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
HALKBANK.execmd.exeRegAsm.exefirefoxx.exeRegAsm.exedescription pid process target process PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4404 3960 HALKBANK.exe RegAsm.exe PID 3960 wrote to memory of 4732 3960 HALKBANK.exe cmd.exe PID 3960 wrote to memory of 4732 3960 HALKBANK.exe cmd.exe PID 3960 wrote to memory of 4732 3960 HALKBANK.exe cmd.exe PID 4732 wrote to memory of 5108 4732 cmd.exe reg.exe PID 4732 wrote to memory of 5108 4732 cmd.exe reg.exe PID 4732 wrote to memory of 5108 4732 cmd.exe reg.exe PID 3960 wrote to memory of 768 3960 HALKBANK.exe firefoxx.exe PID 3960 wrote to memory of 768 3960 HALKBANK.exe firefoxx.exe PID 3960 wrote to memory of 768 3960 HALKBANK.exe firefoxx.exe PID 4404 wrote to memory of 4300 4404 RegAsm.exe firefoxx.exe PID 4404 wrote to memory of 4300 4404 RegAsm.exe firefoxx.exe PID 4404 wrote to memory of 4300 4404 RegAsm.exe firefoxx.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4300 wrote to memory of 4848 4300 firefoxx.exe RegAsm.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe PID 4848 wrote to memory of 876 4848 RegAsm.exe InstallUtil.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 12404⤵
- Program crash
PID:4532
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Adds Run key to start application
PID:5108
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4300 -ip 43001⤵PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c2a3081353c47c81c743b974abbbb84c
SHA1d2eb69344b2c28506e1134cd278477bb72673242
SHA256f9fd57912c3aff8ff41751965a16532b60682103f3907fbb0d1d42a453eafbf8
SHA512fb59fddc7e0d258aeff65fbf622cb2032fb65e11f74c37a57e4dc4de9557a799e03cf355344605004e06b2c23f5b7e968ae825f36b5b65dd04fbb991850d5555
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
2.6MB
MD59b3462c82f69fbcc99426a93e4234b4f
SHA12becef6e493a7e067ee02fcce536c1f2dcc8f5f3
SHA2560559341de926b16d11ab2ae2516720bad55f44a16d1cdfaf4a06437d54374612
SHA51205116b5ef4aa0aa3a1a677f5dcb56904ec479470d0b29aa02af0a984d080b1caf6229c949a760bcd2131d871756f9d3a9c32df26d64e6e15f8da561018189921
-
Filesize
2.6MB
MD59b3462c82f69fbcc99426a93e4234b4f
SHA12becef6e493a7e067ee02fcce536c1f2dcc8f5f3
SHA2560559341de926b16d11ab2ae2516720bad55f44a16d1cdfaf4a06437d54374612
SHA51205116b5ef4aa0aa3a1a677f5dcb56904ec479470d0b29aa02af0a984d080b1caf6229c949a760bcd2131d871756f9d3a9c32df26d64e6e15f8da561018189921
-
Filesize
2.6MB
MD59b3462c82f69fbcc99426a93e4234b4f
SHA12becef6e493a7e067ee02fcce536c1f2dcc8f5f3
SHA2560559341de926b16d11ab2ae2516720bad55f44a16d1cdfaf4a06437d54374612
SHA51205116b5ef4aa0aa3a1a677f5dcb56904ec479470d0b29aa02af0a984d080b1caf6229c949a760bcd2131d871756f9d3a9c32df26d64e6e15f8da561018189921