Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe
Resource
win10v2004-20230220-en
General
-
Target
Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe
-
Size
881KB
-
MD5
d3c7409accf6c0b36d500d68be6eb07b
-
SHA1
4d6cb1522da5bd581877e280eb943cd66a66d774
-
SHA256
b2eb42a73b2d0577b927a7e2f287262116d8b0962e975d66ae7c1f2dc50626a2
-
SHA512
9ed3c7099c65e0295331a2ea66aa87e6a6cd5e27018f228638f66e90a52e7fc3fbcf76e14208f258dd9a768abfffcb2e58a39ba6890b6cc7e3777931a4c96525
-
SSDEEP
24576:n/thewlqB6pnPOdrxQi0rxhxfCoKw4prAyIxBSV:Xe2q8pnPyPXoKw4JAysB
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5409839916:AAEYUYZy0IhJQAm4VXi620si4okGW8FDL2w/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1296 set thread context of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 368 powershell.exe 1256 powershell.exe 1488 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 1488 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1488 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe Token: SeDebugPrivilege 1488 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 368 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1296 wrote to memory of 368 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 28 PID 1296 wrote to memory of 368 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 28 PID 1296 wrote to memory of 368 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 28 PID 1296 wrote to memory of 368 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 28 PID 1296 wrote to memory of 1256 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 30 PID 1296 wrote to memory of 1256 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 30 PID 1296 wrote to memory of 1256 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 30 PID 1296 wrote to memory of 1256 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 30 PID 1296 wrote to memory of 1980 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 32 PID 1296 wrote to memory of 1980 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 32 PID 1296 wrote to memory of 1980 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 32 PID 1296 wrote to memory of 1980 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 32 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 PID 1296 wrote to memory of 1488 1296 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AbXQrP.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AbXQrP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB710.tmp"2⤵
- Creates scheduled task(s)
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Fiyat teklifi Istegi_23051609051 ürun Etiket scan0010_xlsx.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD505ad6fc0459ec8e2f335ab0ff2ab6d3d
SHA1ad0d3c81b98787d206fcca1b7a27ec280919f389
SHA256560d79f89f8f23c479317c1207cfdf5c0971145e4874bf67e814b1ee9fa4d275
SHA5126e9cf373afc783398f2864490bfeb06a8f8e8c1d44d0b508b04bfbd8d22a0bb9b1fa788672a1319e6d11932c69e6ec2bcd6d56e4fb801f8ed9a9a8acb7551740
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VCASHXIFB8CW81ZL5OBP.temp
Filesize7KB
MD5ef966c289d5a05ee12a2654f07cd0221
SHA113d6081991485742cc2ca0b0bf31b94a40f1aa88
SHA25658dd9a62c42fffc532233d7869f76da8bf56c4afa997ede155b101844eeb3607
SHA51253307fea967b0505804e55482d7cfec4e24d2b38193b89c69d9f20d5689fd3dccf51bdd4a7625ac2ecbf9674f521b826cb184561a8fe6aa4ebd417040ded5479
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ef966c289d5a05ee12a2654f07cd0221
SHA113d6081991485742cc2ca0b0bf31b94a40f1aa88
SHA25658dd9a62c42fffc532233d7869f76da8bf56c4afa997ede155b101844eeb3607
SHA51253307fea967b0505804e55482d7cfec4e24d2b38193b89c69d9f20d5689fd3dccf51bdd4a7625ac2ecbf9674f521b826cb184561a8fe6aa4ebd417040ded5479