Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 07:42
Static task
static1
Behavioral task
behavioral1
Sample
FİYAT İSTEĞİ82032023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FİYAT İSTEĞİ82032023.exe
Resource
win10v2004-20230220-en
General
-
Target
FİYAT İSTEĞİ82032023.exe
-
Size
500KB
-
MD5
01f1e05c0db18b1197abe20d9d7fe39d
-
SHA1
36ff0a02c57f1150c6dffa5d620cdc357181604d
-
SHA256
446e23b2ec4a53c537ae29ff5964958702510c8b46c72b68d9141f238a5fe691
-
SHA512
a013168eb1173a619a8ff93292878faa60f8635ff51d23f0e4aaadb61e4dce46186255aef35932f1003b570d6868f0e5bf4b21fe9b4f257dff870cb449053913
-
SSDEEP
12288:Oowkeve7u1hSFHAHnQTRrZYO1HLLY5dXmktgCOfMUd+d:OowdvcunegHQT7YO1HL0dXmTCv
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5409839916:AAEYUYZy0IhJQAm4VXi620si4okGW8FDL2w/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
Processes:
FİYAT İSTEĞİ82032023.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions FİYAT İSTEĞİ82032023.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
FİYAT İSTEĞİ82032023.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools FİYAT İSTEĞİ82032023.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exeFİYAT İSTEĞİ82032023.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FİYAT İSTEĞİ82032023.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FİYAT İSTEĞİ82032023.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FİYAT İSTEĞİ82032023.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation FİYAT İSTEĞİ82032023.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 264 svchost.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FİYAT İSTEĞİ82032023.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" FİYAT İSTEĞİ82032023.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
FİYAT İSTEĞİ82032023.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum FİYAT İSTEĞİ82032023.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 FİYAT İSTEĞİ82032023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 264 set thread context of 3652 264 svchost.exe jsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3052 timeout.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
FİYAT İSTEĞİ82032023.exesvchost.exejsc.exepid process 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 4896 FİYAT İSTEĞİ82032023.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 264 svchost.exe 3652 jsc.exe 3652 jsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
FİYAT İSTEĞİ82032023.exesvchost.exejsc.exedescription pid process Token: SeDebugPrivilege 4896 FİYAT İSTEĞİ82032023.exe Token: SeDebugPrivilege 264 svchost.exe Token: SeDebugPrivilege 3652 jsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
jsc.exepid process 3652 jsc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
FİYAT İSTEĞİ82032023.execmd.execmd.exesvchost.exedescription pid process target process PID 4896 wrote to memory of 1224 4896 FİYAT İSTEĞİ82032023.exe cmd.exe PID 4896 wrote to memory of 1224 4896 FİYAT İSTEĞİ82032023.exe cmd.exe PID 4896 wrote to memory of 1572 4896 FİYAT İSTEĞİ82032023.exe cmd.exe PID 4896 wrote to memory of 1572 4896 FİYAT İSTEĞİ82032023.exe cmd.exe PID 1572 wrote to memory of 3052 1572 cmd.exe timeout.exe PID 1572 wrote to memory of 3052 1572 cmd.exe timeout.exe PID 1224 wrote to memory of 2996 1224 cmd.exe schtasks.exe PID 1224 wrote to memory of 2996 1224 cmd.exe schtasks.exe PID 1572 wrote to memory of 264 1572 cmd.exe svchost.exe PID 1572 wrote to memory of 264 1572 cmd.exe svchost.exe PID 264 wrote to memory of 2604 264 svchost.exe AppLaunch.exe PID 264 wrote to memory of 2604 264 svchost.exe AppLaunch.exe PID 264 wrote to memory of 4620 264 svchost.exe aspnet_state.exe PID 264 wrote to memory of 4620 264 svchost.exe aspnet_state.exe PID 264 wrote to memory of 4104 264 svchost.exe ngentask.exe PID 264 wrote to memory of 4104 264 svchost.exe ngentask.exe PID 264 wrote to memory of 3592 264 svchost.exe WsatConfig.exe PID 264 wrote to memory of 3592 264 svchost.exe WsatConfig.exe PID 264 wrote to memory of 4552 264 svchost.exe MSBuild.exe PID 264 wrote to memory of 4552 264 svchost.exe MSBuild.exe PID 264 wrote to memory of 3668 264 svchost.exe DataSvcUtil.exe PID 264 wrote to memory of 3668 264 svchost.exe DataSvcUtil.exe PID 264 wrote to memory of 3848 264 svchost.exe AddInUtil.exe PID 264 wrote to memory of 3848 264 svchost.exe AddInUtil.exe PID 264 wrote to memory of 948 264 svchost.exe ngen.exe PID 264 wrote to memory of 948 264 svchost.exe ngen.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe PID 264 wrote to memory of 3652 264 svchost.exe jsc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
outlook_win_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FİYAT İSTEĞİ82032023.exe"C:\Users\Admin\AppData\Local\Temp\FİYAT İSTEĞİ82032023.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8A62.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3052
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"4⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"4⤵PID:4620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"4⤵PID:4104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"4⤵PID:3592
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"4⤵PID:4552
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"4⤵PID:3668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"4⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:948
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3652
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD52034a58e463ac8580b7a2e7f73440bb4
SHA1b4874ac8779c6ffb9d867c3518311d2498e761e9
SHA256a67e59c0cb7860fa9b49673f29507bccee323826b748800fb18651cf6eac2b94
SHA5123a1b27348f10c245296784b1079a37fd2932ab4c8d4719a916c0d8f6435be0426fdc2dbf25e1fc65ed3beeebe82fe6600612c612c8b808dbc4d6ed46289a1310
-
Filesize
500KB
MD501f1e05c0db18b1197abe20d9d7fe39d
SHA136ff0a02c57f1150c6dffa5d620cdc357181604d
SHA256446e23b2ec4a53c537ae29ff5964958702510c8b46c72b68d9141f238a5fe691
SHA512a013168eb1173a619a8ff93292878faa60f8635ff51d23f0e4aaadb61e4dce46186255aef35932f1003b570d6868f0e5bf4b21fe9b4f257dff870cb449053913
-
Filesize
500KB
MD501f1e05c0db18b1197abe20d9d7fe39d
SHA136ff0a02c57f1150c6dffa5d620cdc357181604d
SHA256446e23b2ec4a53c537ae29ff5964958702510c8b46c72b68d9141f238a5fe691
SHA512a013168eb1173a619a8ff93292878faa60f8635ff51d23f0e4aaadb61e4dce46186255aef35932f1003b570d6868f0e5bf4b21fe9b4f257dff870cb449053913