Analysis
-
max time kernel
154s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:40
Static task
static1
Behavioral task
behavioral1
Sample
HALKBANK.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HALKBANK.exe
Resource
win10v2004-20220414-en
General
-
Target
HALKBANK.exe
-
Size
2.6MB
-
MD5
0dc79297559b6ff6a2db2870c4de1313
-
SHA1
ed43611311d5a94ce56a5fff8e45a8ac437fbf12
-
SHA256
16fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
-
SHA512
c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bunsadokum.com - Port:
587 - Username:
[email protected] - Password:
posta38Bunsa
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-130-0x0000000000C30000-0x0000000000ED6000-memory.dmp family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger -
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/608-189-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 5 IoCs
Processes:
RegAsm.exefirefoxx.exefirefoxx.exeRegAsm.exeRegAsm.exepid process 748 RegAsm.exe 456 firefoxx.exe 2360 firefoxx.exe 3264 RegAsm.exe 608 RegAsm.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HALKBANK.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation HALKBANK.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefoxx = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\firefoxx.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefoxx = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\firefoxx.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
HALKBANK.exefirefoxx.exeRegAsm.exedescription pid process target process PID 2712 set thread context of 748 2712 HALKBANK.exe RegAsm.exe PID 456 set thread context of 3264 456 firefoxx.exe RegAsm.exe PID 3264 set thread context of 608 3264 RegAsm.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3216 456 WerFault.exe firefoxx.exe 2868 456 WerFault.exe firefoxx.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exefirefoxx.exeRegAsm.exeRegAsm.exepid process 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 748 RegAsm.exe 2712 HALKBANK.exe 748 RegAsm.exe 2712 HALKBANK.exe 748 RegAsm.exe 748 RegAsm.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 748 RegAsm.exe 2712 HALKBANK.exe 748 RegAsm.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 2712 HALKBANK.exe 2712 HALKBANK.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 748 RegAsm.exe 2360 firefoxx.exe 456 firefoxx.exe 456 firefoxx.exe 456 firefoxx.exe 3264 RegAsm.exe 456 firefoxx.exe 456 firefoxx.exe 3264 RegAsm.exe 3264 RegAsm.exe 608 RegAsm.exe 608 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exefirefoxx.exeRegAsm.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 2712 HALKBANK.exe Token: SeDebugPrivilege 748 RegAsm.exe Token: SeDebugPrivilege 2360 firefoxx.exe Token: SeDebugPrivilege 456 firefoxx.exe Token: SeDebugPrivilege 3264 RegAsm.exe Token: SeDebugPrivilege 608 RegAsm.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
HALKBANK.exeRegAsm.execmd.execmd.exefirefoxx.exeRegAsm.exedescription pid process target process PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 748 2712 HALKBANK.exe RegAsm.exe PID 2712 wrote to memory of 2332 2712 HALKBANK.exe cmd.exe PID 2712 wrote to memory of 2332 2712 HALKBANK.exe cmd.exe PID 2712 wrote to memory of 2332 2712 HALKBANK.exe cmd.exe PID 748 wrote to memory of 4472 748 RegAsm.exe cmd.exe PID 748 wrote to memory of 4472 748 RegAsm.exe cmd.exe PID 748 wrote to memory of 4472 748 RegAsm.exe cmd.exe PID 2332 wrote to memory of 728 2332 cmd.exe reg.exe PID 2332 wrote to memory of 728 2332 cmd.exe reg.exe PID 2332 wrote to memory of 728 2332 cmd.exe reg.exe PID 4472 wrote to memory of 1552 4472 cmd.exe reg.exe PID 4472 wrote to memory of 1552 4472 cmd.exe reg.exe PID 4472 wrote to memory of 1552 4472 cmd.exe reg.exe PID 748 wrote to memory of 456 748 RegAsm.exe firefoxx.exe PID 748 wrote to memory of 456 748 RegAsm.exe firefoxx.exe PID 748 wrote to memory of 456 748 RegAsm.exe firefoxx.exe PID 2712 wrote to memory of 2360 2712 HALKBANK.exe firefoxx.exe PID 2712 wrote to memory of 2360 2712 HALKBANK.exe firefoxx.exe PID 2712 wrote to memory of 2360 2712 HALKBANK.exe firefoxx.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 456 wrote to memory of 3264 456 firefoxx.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 3264 wrote to memory of 608 3264 RegAsm.exe RegAsm.exe PID 456 wrote to memory of 3216 456 firefoxx.exe WerFault.exe PID 456 wrote to memory of 3216 456 firefoxx.exe WerFault.exe PID 456 wrote to memory of 3216 456 firefoxx.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"4⤵
- Adds Run key to start application
PID:1552
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 12644⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 12644⤵
- Program crash
PID:2868
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Adds Run key to start application
PID:728
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 456 -ip 4561⤵PID:2584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD547f56f7a4208d40f024952a3a0e321d9
SHA12378ca699a7a6d441d82df52e9c26936e60a4498
SHA256facbf316a2254647ff371e485d7ed4b97ade4450685d7a992fa573c0d3e159e7
SHA512c8b9e53739e17bd7c72df0dbb0e24fb6f0581c658b79a395a09aea463f141489848fd62a265a09dfb3da4feb7abc3d5f323743921faa3c951d00b1a18a65c39c
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b