Analysis

  • max time kernel
    137s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 11:35

General

  • Target

    hesaphareketi000001,pdf.exe

  • Size

    2.9MB

  • MD5

    62365690663bb84166207a981d124d64

  • SHA1

    35a0d45093ab7d5e6acc22b0f1b1ee0eaf38da26

  • SHA256

    d90041e6b2a7deca5936829d8a2f6b9c190abcab6c81c3a99b22d41ed6fffbb0

  • SHA512

    2b35cbbe45a125f373d4f57b1184e12ab88c4cd6c76d51bdc4f928a89bdf324eb4cd036fe9df22c69858bd83d9bfd07b012630ea7ebccbb877373f3c235b1135

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cappac.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    aTlcLVD6nhEE

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 12 IoCs
  • AgentTesla Payload 7 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hesaphareketi000001,pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\hesaphareketi000001,pdf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
        3⤵
        • Executes dropped EXE
        PID:884
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 728
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1040
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"
        3⤵
        • Adds Run key to start application
        PID:592
    • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

    Filesize

    40KB

    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

    Filesize

    40KB

    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

    Filesize

    40KB

    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • \Users\Admin\AppData\Local\Temp\InstallUtil.exe

    Filesize

    40KB

    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • \Users\Admin\AppData\Local\Temp\InstallUtil.exe

    Filesize

    40KB

    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe

    Filesize

    1.2MB

    MD5

    9a4460e1522d6e13d6f326674524c405

    SHA1

    d8484d2d265f4f5d83917532465210ddf658aa08

    SHA256

    0122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b

    SHA512

    0bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2

  • memory/856-61-0x0000000000CF0000-0x0000000000E26000-memory.dmp

    Filesize

    1.2MB

  • memory/884-85-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/884-86-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/884-83-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/884-82-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1564-72-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1564-78-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1564-76-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1564-71-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1564-70-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1564-68-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1564-67-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1864-54-0x0000000001060000-0x0000000001342000-memory.dmp

    Filesize

    2.9MB

  • memory/1864-65-0x0000000000A80000-0x0000000000A8A000-memory.dmp

    Filesize

    40KB

  • memory/1864-56-0x0000000000380000-0x000000000038A000-memory.dmp

    Filesize

    40KB

  • memory/1864-55-0x0000000075A61000-0x0000000075A63000-memory.dmp

    Filesize

    8KB