Analysis
-
max time kernel
159s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:18
Static task
static1
Behavioral task
behavioral1
Sample
ZiraatBankasi-SwiftMesaji20221121.exe
Resource
win7-20220812-en
General
-
Target
ZiraatBankasi-SwiftMesaji20221121.exe
-
Size
1003KB
-
MD5
394f30cac9eef76036a281aba4a390ac
-
SHA1
9c764db3dccde0a69d915cdb1e1d8041c2353f8e
-
SHA256
167142b256a43661a934dac8d2e84d1167e66022acb9e374e4542adbaceff753
-
SHA512
ff2ed218d39a2d78e805c2d26729da29c37cc2d61c7ab64ac982a0097dad4e1c690465c348702555143120aaa1b0986f61252b811d1d9712bd41d24fa59c916b
-
SSDEEP
24576:td3yd+KevnuWLrR7wOwZQroOpUTLHh5er4+L74mBfNUstzo:td3W0pwBaoOpuHhI
Malware Config
Extracted
formbook
go5o
fS9ce6bj/U7J6Q==
KPSUZUVU42J3IaXPjqsA
cDR9Sz1n2BN9eTutNa2QNg==
POJskuyBUqUdVp2wiI8=
t9gcQ5yNydIfrO4=
9oakDnoh0VXC
o2Z9n/2iYtDFcJ2wiI8=
GLBJZsgVkt3eXZragNJjYiGQ
axuNlck5BkA8plrI
khk2/+G5g43K
Fauoa7FQG6EN2QyITg==
fgaVrOb4mLl1KGNUX6jkXCU=
HQkML53cm6Ae+zIhRg==
TBodPq4E4AJylpZiNa2QNg==
wHghSq49EVU54E8mChOvRi5W3cn3ItLVVw==
rET2JY8u+TgVpzRtRF54Kw==
b0mCXc5pcXHZ9A==
QfuIoOgHl9IfrO4=
87fV+WQT5IKlSnTqmb6SbSMctA==
E+Yg8EqQKJi9XJKVqrA2i9TO78H53I97
LeWeZ50+811sD0hBWqjkXCU=
bPyZY0ld5GN/H1lKRmgmydYQuZuExA==
AJorxbIBwM0aOEAUACYAq7bsdnM=
kmK4G/8W4N04F53/j/V+OagKj3s=
yoe85VGgbYbp9Q==
RvjzEYMiAE0RkZAlUEW1xyw=
7KZWBufulMB8F0pRZXH9HpgGCrj53I97
ZxcsP4Pg7y/Q
8ZwWqJB5PYPI
LtPQ5U70sDU4tuzLDkRuvgzzf+XjIKA=
LchKXNG8SYPI
eggVLIQf8hTMSjmzfseG+SrDa3E=
bxEUqpLITfvWoM/MKoY=
HdSAKTrbmCi85tdKwWB+Lw==
QEVm0WweJVKb4w==
il8YpzvOlbkPJR6mNa2QNg==
8ZA0CXK3Oo7/2QyITg==
hTa9Vowf6DGs1M2Xsvi2bSMctA==
Nd8LI2CzeOhhiYleNa2QNg==
+6pZc6DEXLYNDEnHfpg=
rV6Pc+4HnBmlqWvcdRHjhDg=
aAOicKQ68mpuGYhrn9VjYiGQ
byHN+WL3uVUCF5pYLXY2qanhW2s=
oVj2FDxA0kdA52CsGAFjYiGQ
f0VuN2yEHYKcGttd8OoI
x1fhzaLp/U7J6Q==
oSYRG0luAU4LoJ2wiI8=
0HpzWaxEFkP0Tb+OcYc=
rkZnfqPi/U7J6Q==
QSylwtbvZ72ZSYonpecd
POGQYz0b9VOc4w==
Nc5Obd59MrxFc35fZpzxjjw=
ioQplKY9Bj88plrI
Z/iUov+sY9ZhmpP6qQsUB1c98LQkYL0=
oErD7lsD/wveW1IpRg==
Vhq7aVKdY9vQc52wiI8=
olTu0HTf6FrJ6Q==
tnQDk8o7rgBenB2lVg==
BqSrTy8Dzt0jI47c
Tfz7t524PZkC2QyITg==
32AHHUNa7kYlyQdCmecd
03N6SrhcLU08plrI
BpY8DHfKOcj5emnmiG8IrbbsdnM=
BrGoS7W9TMWQRQkjo+QDWKVPG6EQwg==
thepokecraft.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221121.exedescription pid process target process PID 4264 set thread context of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221121.exeZiraatBankasi-SwiftMesaji20221121.exepid process 4264 ZiraatBankasi-SwiftMesaji20221121.exe 4264 ZiraatBankasi-SwiftMesaji20221121.exe 3116 ZiraatBankasi-SwiftMesaji20221121.exe 3116 ZiraatBankasi-SwiftMesaji20221121.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221121.exedescription pid process Token: SeDebugPrivilege 4264 ZiraatBankasi-SwiftMesaji20221121.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221121.exedescription pid process target process PID 4264 wrote to memory of 3516 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3516 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3516 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe PID 4264 wrote to memory of 3116 4264 ZiraatBankasi-SwiftMesaji20221121.exe ZiraatBankasi-SwiftMesaji20221121.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221121.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221121.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221121.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221121.exe"2⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221121.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221121.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116