Analysis
-
max time kernel
154s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
ZiraatBankasi-SwiftMesaji20221123.exe
Resource
win7-20221111-en
General
-
Target
ZiraatBankasi-SwiftMesaji20221123.exe
-
Size
1.1MB
-
MD5
0f46ecb9b5ea6f5fcbaf7056c316259c
-
SHA1
bc171b3c828566a705e82dce3a96f78e836c2dd1
-
SHA256
8a530805d14a1d39f4016d711091acc26f7404a1dca050407f6d6ba4eeaef0f5
-
SHA512
8fdde0979eb61549793725bb95455291a32ef7b674af43602239e697886941d4189d35ceb9b70b5e440b4f480fa8e333dbb960b4b7f586061697296d14a73bb4
-
SSDEEP
24576:8sGpbZ7QlqRYYlQ6SdVqeK0kUBwUaFkwWR+UBqdOp:iNJtRMnV0UcywWR+UBqdO
Malware Config
Extracted
formbook
go5o
fS9ce6bj/U7J6Q==
KPSUZUVU42J3IaXPjqsA
cDR9Sz1n2BN9eTutNa2QNg==
POJskuyBUqUdVp2wiI8=
t9gcQ5yNydIfrO4=
9oakDnoh0VXC
o2Z9n/2iYtDFcJ2wiI8=
GLBJZsgVkt3eXZragNJjYiGQ
axuNlck5BkA8plrI
khk2/+G5g43K
Fauoa7FQG6EN2QyITg==
fgaVrOb4mLl1KGNUX6jkXCU=
HQkML53cm6Ae+zIhRg==
TBodPq4E4AJylpZiNa2QNg==
wHghSq49EVU54E8mChOvRi5W3cn3ItLVVw==
rET2JY8u+TgVpzRtRF54Kw==
b0mCXc5pcXHZ9A==
QfuIoOgHl9IfrO4=
87fV+WQT5IKlSnTqmb6SbSMctA==
E+Yg8EqQKJi9XJKVqrA2i9TO78H53I97
LeWeZ50+811sD0hBWqjkXCU=
bPyZY0ld5GN/H1lKRmgmydYQuZuExA==
AJorxbIBwM0aOEAUACYAq7bsdnM=
kmK4G/8W4N04F53/j/V+OagKj3s=
yoe85VGgbYbp9Q==
RvjzEYMiAE0RkZAlUEW1xyw=
7KZWBufulMB8F0pRZXH9HpgGCrj53I97
ZxcsP4Pg7y/Q
8ZwWqJB5PYPI
LtPQ5U70sDU4tuzLDkRuvgzzf+XjIKA=
LchKXNG8SYPI
eggVLIQf8hTMSjmzfseG+SrDa3E=
bxEUqpLITfvWoM/MKoY=
HdSAKTrbmCi85tdKwWB+Lw==
QEVm0WweJVKb4w==
il8YpzvOlbkPJR6mNa2QNg==
8ZA0CXK3Oo7/2QyITg==
hTa9Vowf6DGs1M2Xsvi2bSMctA==
Nd8LI2CzeOhhiYleNa2QNg==
+6pZc6DEXLYNDEnHfpg=
rV6Pc+4HnBmlqWvcdRHjhDg=
aAOicKQ68mpuGYhrn9VjYiGQ
byHN+WL3uVUCF5pYLXY2qanhW2s=
oVj2FDxA0kdA52CsGAFjYiGQ
f0VuN2yEHYKcGttd8OoI
x1fhzaLp/U7J6Q==
oSYRG0luAU4LoJ2wiI8=
0HpzWaxEFkP0Tb+OcYc=
rkZnfqPi/U7J6Q==
QSylwtbvZ72ZSYonpecd
POGQYz0b9VOc4w==
Nc5Obd59MrxFc35fZpzxjjw=
ioQplKY9Bj88plrI
Z/iUov+sY9ZhmpP6qQsUB1c98LQkYL0=
oErD7lsD/wveW1IpRg==
Vhq7aVKdY9vQc52wiI8=
olTu0HTf6FrJ6Q==
tnQDk8o7rgBenB2lVg==
BqSrTy8Dzt0jI47c
Tfz7t524PZkC2QyITg==
32AHHUNa7kYlyQdCmecd
03N6SrhcLU08plrI
BpY8DHfKOcj5emnmiG8IrbbsdnM=
BrGoS7W9TMWQRQkjo+QDWKVPG6EQwg==
thepokecraft.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221123.exedescription pid process target process PID 4424 set thread context of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221123.exepid process 4412 ZiraatBankasi-SwiftMesaji20221123.exe 4412 ZiraatBankasi-SwiftMesaji20221123.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ZiraatBankasi-SwiftMesaji20221123.exedescription pid process target process PID 4424 wrote to memory of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe PID 4424 wrote to memory of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe PID 4424 wrote to memory of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe PID 4424 wrote to memory of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe PID 4424 wrote to memory of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe PID 4424 wrote to memory of 4412 4424 ZiraatBankasi-SwiftMesaji20221123.exe ZiraatBankasi-SwiftMesaji20221123.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412