Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2022 19:06
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hesaphareketi.exe
Resource
win10v2004-20220812-en
General
-
Target
hesaphareketi.exe
-
Size
242KB
-
MD5
c66347958b1a61cfdebb3c9e9b97f0be
-
SHA1
aedef9e586da499418f10f9e440633df8331c0d1
-
SHA256
1c0d0b7350789ac3cd3aaac71175646d9f06f9240689be3b62293e94ffc12658
-
SHA512
06574dcb091764a7c69125c72b3d1d8512ccfc5bea092fd7d7fd10acebbad061fae6bfa20aa04b40afc84b6cb3505505b2029515415d65e28efb302d796ccdef
-
SSDEEP
3072:bSyxlHtVN9yzH+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtE:bhVs159HsaIYkb
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3120-154-0x0000000000AB0000-0x0000000000ACA000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation hesaphareketi.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 76 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4764 set thread context of 1348 4764 hesaphareketi.exe 100 PID 1348 set thread context of 3120 1348 hesaphareketi.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3964 powershell.exe 3964 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1348 hesaphareketi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4764 hesaphareketi.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 3120 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 hesaphareketi.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3964 4764 hesaphareketi.exe 95 PID 4764 wrote to memory of 3964 4764 hesaphareketi.exe 95 PID 4764 wrote to memory of 3964 4764 hesaphareketi.exe 95 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 4764 wrote to memory of 1348 4764 hesaphareketi.exe 100 PID 1348 wrote to memory of 3120 1348 hesaphareketi.exe 101 PID 1348 wrote to memory of 3120 1348 hesaphareketi.exe 101 PID 1348 wrote to memory of 3120 1348 hesaphareketi.exe 101 PID 1348 wrote to memory of 3120 1348 hesaphareketi.exe 101 PID 1348 wrote to memory of 3120 1348 hesaphareketi.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAOQA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi.exeC:\Users\Admin\AppData\Local\Temp\hesaphareketi.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-