Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi000001,pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
hesaphareketi000001,pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
hesaphareketi000001,pdf.exe
-
Size
2.9MB
-
MD5
62365690663bb84166207a981d124d64
-
SHA1
35a0d45093ab7d5e6acc22b0f1b1ee0eaf38da26
-
SHA256
d90041e6b2a7deca5936829d8a2f6b9c190abcab6c81c3a99b22d41ed6fffbb0
-
SHA512
2b35cbbe45a125f373d4f57b1184e12ab88c4cd6c76d51bdc4f928a89bdf324eb4cd036fe9df22c69858bd83d9bfd07b012630ea7ebccbb877373f3c235b1135
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cappac.com.tr - Port:
587 - Username:
[email protected] - Password:
aTlcLVD6nhEE
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1752-130-0x00000000005F0000-0x00000000008D2000-memory.dmp family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe family_masslogger behavioral2/memory/4200-137-0x0000000000020000-0x0000000000156000-memory.dmp family_masslogger behavioral2/memory/1096-149-0x0000000000590000-0x000000000062A000-memory.dmp family_masslogger -
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1752-130-0x00000000005F0000-0x00000000008D2000-memory.dmp family_agenttesla behavioral2/memory/5008-141-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 3 IoCs
Processes:
chromee.exeInstallUtil.exeInstallUtil.exepid process 4200 chromee.exe 5008 InstallUtil.exe 1096 InstallUtil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
hesaphareketi000001,pdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation hesaphareketi000001,pdf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chromee = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chromee.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
hesaphareketi000001,pdf.exechromee.exedescription pid process target process PID 1752 set thread context of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 4200 set thread context of 1096 4200 chromee.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
hesaphareketi000001,pdf.exechromee.exeInstallUtil.exepowershell.exepid process 1752 hesaphareketi000001,pdf.exe 1752 hesaphareketi000001,pdf.exe 1752 hesaphareketi000001,pdf.exe 4200 chromee.exe 5008 InstallUtil.exe 5008 InstallUtil.exe 4200 chromee.exe 4200 chromee.exe 4896 powershell.exe 4896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
hesaphareketi000001,pdf.exechromee.exeInstallUtil.exepowershell.exedescription pid process Token: SeDebugPrivilege 1752 hesaphareketi000001,pdf.exe Token: SeDebugPrivilege 4200 chromee.exe Token: SeDebugPrivilege 5008 InstallUtil.exe Token: SeDebugPrivilege 4896 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
hesaphareketi000001,pdf.execmd.exechromee.exeInstallUtil.execmd.exedescription pid process target process PID 1752 wrote to memory of 4200 1752 hesaphareketi000001,pdf.exe chromee.exe PID 1752 wrote to memory of 4200 1752 hesaphareketi000001,pdf.exe chromee.exe PID 1752 wrote to memory of 4200 1752 hesaphareketi000001,pdf.exe chromee.exe PID 1752 wrote to memory of 4596 1752 hesaphareketi000001,pdf.exe cmd.exe PID 1752 wrote to memory of 4596 1752 hesaphareketi000001,pdf.exe cmd.exe PID 1752 wrote to memory of 4596 1752 hesaphareketi000001,pdf.exe cmd.exe PID 4596 wrote to memory of 5036 4596 cmd.exe reg.exe PID 4596 wrote to memory of 5036 4596 cmd.exe reg.exe PID 4596 wrote to memory of 5036 4596 cmd.exe reg.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 1752 wrote to memory of 5008 1752 hesaphareketi000001,pdf.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 4200 wrote to memory of 1096 4200 chromee.exe InstallUtil.exe PID 1096 wrote to memory of 1200 1096 InstallUtil.exe cmd.exe PID 1096 wrote to memory of 1200 1096 InstallUtil.exe cmd.exe PID 1096 wrote to memory of 1200 1096 InstallUtil.exe cmd.exe PID 1200 wrote to memory of 4896 1200 cmd.exe powershell.exe PID 1200 wrote to memory of 4896 1200 cmd.exe powershell.exe PID 1200 wrote to memory of 4896 1200 cmd.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi000001,pdf.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi000001,pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"3⤵
- Adds Run key to start application
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
1.2MB
MD59a4460e1522d6e13d6f326674524c405
SHA1d8484d2d265f4f5d83917532465210ddf658aa08
SHA2560122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b
SHA5120bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2
-
Filesize
1.2MB
MD59a4460e1522d6e13d6f326674524c405
SHA1d8484d2d265f4f5d83917532465210ddf658aa08
SHA2560122fb26a12f86f9e8eef0498a4d7f350846885bdb8b6ced21a68baa0e73be6b
SHA5120bd99764516d33191d5bf7b2c3b1f247aad039136892f39c4941c8aa07f4c1cc3935949c1d8c91ec4a28ec3125302357390df9be6187720ccdb0a97221bfa1a2