Analysis
-
max time kernel
56s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 07:17
Static task
static1
Behavioral task
behavioral1
Sample
ZiraatBankasi_SwiftMesaji20221129.exe
Resource
win7-20220812-en
General
-
Target
ZiraatBankasi_SwiftMesaji20221129.exe
-
Size
720KB
-
MD5
850de91289a8d49117ff7b3e28551909
-
SHA1
83f99c1b73c61434768b0a87aec7eb9d0c3a48d0
-
SHA256
a7537f2ef1d10ef549145bd8ce586f1cce82ed841eda60b991b01137bd558bab
-
SHA512
94526ca78e830c53ec08edac0a1831587a6b7d0f6dff0e81294ea174a878a03270d24f0a5197e73134588a6cef6a554d5f7f064d9a242246fd7be31f99149bf4
-
SSDEEP
12288:/VShRpl3UrNYkFw1S72plNchQ4Vu1AnSq59gEolo0HzeoVCNQuw7rG2Ut8Oe:dSh3l3+NC7qZVCWo+0CosNJcUtXe
Malware Config
Extracted
formbook
go5o
fS9ce6bj/U7J6Q==
KPSUZUVU42J3IaXPjqsA
cDR9Sz1n2BN9eTutNa2QNg==
POJskuyBUqUdVp2wiI8=
t9gcQ5yNydIfrO4=
9oakDnoh0VXC
o2Z9n/2iYtDFcJ2wiI8=
GLBJZsgVkt3eXZragNJjYiGQ
axuNlck5BkA8plrI
khk2/+G5g43K
Fauoa7FQG6EN2QyITg==
fgaVrOb4mLl1KGNUX6jkXCU=
HQkML53cm6Ae+zIhRg==
TBodPq4E4AJylpZiNa2QNg==
wHghSq49EVU54E8mChOvRi5W3cn3ItLVVw==
rET2JY8u+TgVpzRtRF54Kw==
b0mCXc5pcXHZ9A==
QfuIoOgHl9IfrO4=
87fV+WQT5IKlSnTqmb6SbSMctA==
E+Yg8EqQKJi9XJKVqrA2i9TO78H53I97
LeWeZ50+811sD0hBWqjkXCU=
bPyZY0ld5GN/H1lKRmgmydYQuZuExA==
AJorxbIBwM0aOEAUACYAq7bsdnM=
kmK4G/8W4N04F53/j/V+OagKj3s=
yoe85VGgbYbp9Q==
RvjzEYMiAE0RkZAlUEW1xyw=
7KZWBufulMB8F0pRZXH9HpgGCrj53I97
ZxcsP4Pg7y/Q
8ZwWqJB5PYPI
LtPQ5U70sDU4tuzLDkRuvgzzf+XjIKA=
LchKXNG8SYPI
eggVLIQf8hTMSjmzfseG+SrDa3E=
bxEUqpLITfvWoM/MKoY=
HdSAKTrbmCi85tdKwWB+Lw==
QEVm0WweJVKb4w==
il8YpzvOlbkPJR6mNa2QNg==
8ZA0CXK3Oo7/2QyITg==
hTa9Vowf6DGs1M2Xsvi2bSMctA==
Nd8LI2CzeOhhiYleNa2QNg==
+6pZc6DEXLYNDEnHfpg=
rV6Pc+4HnBmlqWvcdRHjhDg=
aAOicKQ68mpuGYhrn9VjYiGQ
byHN+WL3uVUCF5pYLXY2qanhW2s=
oVj2FDxA0kdA52CsGAFjYiGQ
f0VuN2yEHYKcGttd8OoI
x1fhzaLp/U7J6Q==
oSYRG0luAU4LoJ2wiI8=
0HpzWaxEFkP0Tb+OcYc=
rkZnfqPi/U7J6Q==
QSylwtbvZ72ZSYonpecd
POGQYz0b9VOc4w==
Nc5Obd59MrxFc35fZpzxjjw=
ioQplKY9Bj88plrI
Z/iUov+sY9ZhmpP6qQsUB1c98LQkYL0=
oErD7lsD/wveW1IpRg==
Vhq7aVKdY9vQc52wiI8=
olTu0HTf6FrJ6Q==
tnQDk8o7rgBenB2lVg==
BqSrTy8Dzt0jI47c
Tfz7t524PZkC2QyITg==
32AHHUNa7kYlyQdCmecd
03N6SrhcLU08plrI
BpY8DHfKOcj5emnmiG8IrbbsdnM=
BrGoS7W9TMWQRQkjo+QDWKVPG6EQwg==
thepokecraft.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZiraatBankasi_SwiftMesaji20221129.exedescription pid process target process PID 1384 set thread context of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ZiraatBankasi_SwiftMesaji20221129.exepid process 2012 ZiraatBankasi_SwiftMesaji20221129.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ZiraatBankasi_SwiftMesaji20221129.exedescription pid process target process PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe PID 1384 wrote to memory of 2012 1384 ZiraatBankasi_SwiftMesaji20221129.exe ZiraatBankasi_SwiftMesaji20221129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi_SwiftMesaji20221129.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi_SwiftMesaji20221129.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi_SwiftMesaji20221129.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi_SwiftMesaji20221129.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1384-54-0x0000000000990000-0x0000000000A4A000-memory.dmpFilesize
744KB
-
memory/1384-55-0x0000000076DC1000-0x0000000076DC3000-memory.dmpFilesize
8KB
-
memory/1384-56-0x00000000044A0000-0x0000000004540000-memory.dmpFilesize
640KB
-
memory/1384-57-0x00000000004C0000-0x00000000004D6000-memory.dmpFilesize
88KB
-
memory/1384-58-0x0000000000530000-0x000000000053E000-memory.dmpFilesize
56KB
-
memory/1384-59-0x0000000005060000-0x00000000050D0000-memory.dmpFilesize
448KB
-
memory/1384-60-0x0000000000950000-0x0000000000984000-memory.dmpFilesize
208KB
-
memory/2012-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2012-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2012-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2012-65-0x00000000004012B0-mapping.dmp
-
memory/2012-67-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2012-68-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/2012-69-0x0000000000A50000-0x0000000000D53000-memory.dmpFilesize
3.0MB