Analysis
-
max time kernel
168s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
Hesap hareketleriniz.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Hesap hareketleriniz.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Hesap hareketleriniz.exe
-
Size
1.1MB
-
MD5
f8cb3827be49821b2ab5a48741fc55ab
-
SHA1
506c306aeabda2be2322f8291b8dac5c0ece9a30
-
SHA256
890b8e57454bafbe3dd79e1a4a42ef308cd072d079822e9275960e6be9418551
-
SHA512
45c61e2ac124e5ec4b473e26ae821af4e5160b636578ad320723914382393836f35ae890923e20ef8cde7a5a6cad5a7b82dd2eb9d64fc91c2e5ff37fe81ff293
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 352 set thread context of 3628 352 Hesap hareketleriniz.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 352 Hesap hareketleriniz.exe 352 Hesap hareketleriniz.exe 4652 powershell.exe 4652 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 352 Hesap hareketleriniz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4652 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe 81 PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe 81 PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe 81 PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe 81 PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe 81 PID 352 wrote to memory of 3628 352 Hesap hareketleriniz.exe 82 PID 352 wrote to memory of 3628 352 Hesap hareketleriniz.exe 82 PID 352 wrote to memory of 3628 352 Hesap hareketleriniz.exe 82 PID 3628 wrote to memory of 1352 3628 Hesap hareketleriniz.exe 90 PID 3628 wrote to memory of 1352 3628 Hesap hareketleriniz.exe 90 PID 3628 wrote to memory of 1352 3628 Hesap hareketleriniz.exe 90 PID 1352 wrote to memory of 4652 1352 cmd.exe 92 PID 1352 wrote to memory of 4652 1352 cmd.exe 92 PID 1352 wrote to memory of 4652 1352 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
-