Analysis
-
max time kernel
168s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
Hesap hareketleriniz.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Hesap hareketleriniz.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Hesap hareketleriniz.exe
-
Size
1.1MB
-
MD5
f8cb3827be49821b2ab5a48741fc55ab
-
SHA1
506c306aeabda2be2322f8291b8dac5c0ece9a30
-
SHA256
890b8e57454bafbe3dd79e1a4a42ef308cd072d079822e9275960e6be9418551
-
SHA512
45c61e2ac124e5ec4b473e26ae821af4e5160b636578ad320723914382393836f35ae890923e20ef8cde7a5a6cad5a7b82dd2eb9d64fc91c2e5ff37fe81ff293
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Hesap hareketleriniz.exedescription pid process target process PID 352 set thread context of 3628 352 Hesap hareketleriniz.exe Hesap hareketleriniz.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Hesap hareketleriniz.exepowershell.exepid process 352 Hesap hareketleriniz.exe 352 Hesap hareketleriniz.exe 4652 powershell.exe 4652 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Hesap hareketleriniz.exepid process 352 Hesap hareketleriniz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4652 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Hesap hareketleriniz.exeHesap hareketleriniz.execmd.exedescription pid process target process PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe notepad.exe PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe notepad.exe PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe notepad.exe PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe notepad.exe PID 352 wrote to memory of 3560 352 Hesap hareketleriniz.exe notepad.exe PID 352 wrote to memory of 3628 352 Hesap hareketleriniz.exe Hesap hareketleriniz.exe PID 352 wrote to memory of 3628 352 Hesap hareketleriniz.exe Hesap hareketleriniz.exe PID 352 wrote to memory of 3628 352 Hesap hareketleriniz.exe Hesap hareketleriniz.exe PID 3628 wrote to memory of 1352 3628 Hesap hareketleriniz.exe cmd.exe PID 3628 wrote to memory of 1352 3628 Hesap hareketleriniz.exe cmd.exe PID 3628 wrote to memory of 1352 3628 Hesap hareketleriniz.exe cmd.exe PID 1352 wrote to memory of 4652 1352 cmd.exe powershell.exe PID 1352 wrote to memory of 4652 1352 cmd.exe powershell.exe PID 1352 wrote to memory of 4652 1352 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/352-130-0x0000000000400000-0x0000000000517000-memory.dmpFilesize
1.1MB
-
memory/1352-139-0x0000000000000000-mapping.dmp
-
memory/3560-131-0x0000000000000000-mapping.dmp
-
memory/3628-132-0x0000000000000000-mapping.dmp
-
memory/3628-133-0x0000000000CC0000-0x0000000000D84000-memory.dmpFilesize
784KB
-
memory/3628-134-0x0000000000CC0000-0x0000000000D84000-memory.dmpFilesize
784KB
-
memory/3628-135-0x0000000004D70000-0x0000000005314000-memory.dmpFilesize
5.6MB
-
memory/3628-136-0x0000000004C30000-0x0000000004CCC000-memory.dmpFilesize
624KB
-
memory/3628-137-0x00000000053A0000-0x0000000005406000-memory.dmpFilesize
408KB
-
memory/3628-138-0x0000000005710000-0x00000000057A2000-memory.dmpFilesize
584KB
-
memory/4652-140-0x0000000000000000-mapping.dmp
-
memory/4652-141-0x0000000002760000-0x0000000002796000-memory.dmpFilesize
216KB
-
memory/4652-142-0x0000000005240000-0x0000000005868000-memory.dmpFilesize
6.2MB
-
memory/4652-143-0x00000000051A0000-0x00000000051C2000-memory.dmpFilesize
136KB
-
memory/4652-144-0x0000000005920000-0x0000000005986000-memory.dmpFilesize
408KB
-
memory/4652-145-0x0000000005FE0000-0x0000000005FFE000-memory.dmpFilesize
120KB
-
memory/4652-146-0x00000000078C0000-0x0000000007F3A000-memory.dmpFilesize
6.5MB
-
memory/4652-147-0x00000000062F0000-0x000000000630A000-memory.dmpFilesize
104KB
-
memory/4652-148-0x0000000007240000-0x00000000072D6000-memory.dmpFilesize
600KB
-
memory/4652-149-0x0000000006440000-0x0000000006462000-memory.dmpFilesize
136KB