Resubmissions
22-08-2022 13:50
220822-q5gwlsbeh5 322-08-2022 13:39
220822-qx9awsbea6 919-08-2022 15:22
220819-srv77afaer 10Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2022 15:22
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift Mesaji.exe
Resource
win10v2004-20220812-en
General
-
Target
Ziraat Bankasi Swift Mesaji.exe
-
Size
21KB
-
MD5
d865c75250a61c050f69dbb8735581a5
-
SHA1
3e7d1b0b961ea899e89902977e36b70fd92351a3
-
SHA256
52e3ee0168f34ab782a8103dc77814efe970b2a0fc5636a7266a4ea3e9bae2e7
-
SHA512
66f9439bd3f91e47ab4343147fe10d4a01fa1930b8533165744366c922865b59709683e9d453d5b2d80d12715bcb43b6898365026b12bda1817a4c8317d26500
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4680-150-0x0000000000970000-0x000000000098A000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Ziraat Bankasi Swift Mesaji.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dtbdiyy = "\"C:\\Users\\Admin\\AppData\\Roaming\\Hiaclbrns\\Dtbdiyy.exe\"" Ziraat Bankasi Swift Mesaji.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1360 set thread context of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 3492 set thread context of 4680 3492 Ziraat Bankasi Swift Mesaji.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 384 powershell.exe 384 powershell.exe 1360 Ziraat Bankasi Swift Mesaji.exe 1360 Ziraat Bankasi Swift Mesaji.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1360 Ziraat Bankasi Swift Mesaji.exe Token: SeDebugPrivilege 384 powershell.exe Token: SeDebugPrivilege 4680 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3492 Ziraat Bankasi Swift Mesaji.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1360 wrote to memory of 384 1360 Ziraat Bankasi Swift Mesaji.exe 85 PID 1360 wrote to memory of 384 1360 Ziraat Bankasi Swift Mesaji.exe 85 PID 1360 wrote to memory of 384 1360 Ziraat Bankasi Swift Mesaji.exe 85 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 1360 wrote to memory of 3492 1360 Ziraat Bankasi Swift Mesaji.exe 87 PID 3492 wrote to memory of 4680 3492 Ziraat Bankasi Swift Mesaji.exe 88 PID 3492 wrote to memory of 4680 3492 Ziraat Bankasi Swift Mesaji.exe 88 PID 3492 wrote to memory of 4680 3492 Ziraat Bankasi Swift Mesaji.exe 88 PID 3492 wrote to memory of 4680 3492 Ziraat Bankasi Swift Mesaji.exe 88 PID 3492 wrote to memory of 4680 3492 Ziraat Bankasi Swift Mesaji.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4680
-
-