Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
Aylık Hesap Hareketleri.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Aylık Hesap Hareketleri.exe
Resource
win10v2004-20230703-en
General
-
Target
Aylık Hesap Hareketleri.exe
-
Size
1.1MB
-
MD5
0f637d22a2ff666c44bd9531d21b4549
-
SHA1
43ce149a7f579d798f39ddd43ab55fbbc80de3a0
-
SHA256
afbe25240ff930618be99be2ac711c4a9f6e1610873a22cffedf33eae5245259
-
SHA512
233fe08f241d024fba13f853bbf6230c5e0531a2b4e8e61a067713b33e14b3aaefe1e87641632f9d1b420b61d1641b7bbbfdae70349aad6eb7e8015912698e95
-
SSDEEP
12288:3EKaJqHnslVBn4FnMN0+2Tk0xIF+K5h9oRVTg5toSosWvWpZ/F4:vCVB4FnU0+2gG9sh9orTg5tN0m/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4408 1288 WerFault.exe 80 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 1928 powershell.exe 180 powershell.exe 1288 Aylık Hesap Hareketleri.exe 1288 Aylık Hesap Hareketleri.exe 180 powershell.exe 1928 powershell.exe 1288 Aylık Hesap Hareketleri.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1288 Aylık Hesap Hareketleri.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 180 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1928 1288 Aylık Hesap Hareketleri.exe 90 PID 1288 wrote to memory of 1928 1288 Aylık Hesap Hareketleri.exe 90 PID 1288 wrote to memory of 1928 1288 Aylık Hesap Hareketleri.exe 90 PID 1288 wrote to memory of 180 1288 Aylık Hesap Hareketleri.exe 92 PID 1288 wrote to memory of 180 1288 Aylık Hesap Hareketleri.exe 92 PID 1288 wrote to memory of 180 1288 Aylık Hesap Hareketleri.exe 92 PID 1288 wrote to memory of 3100 1288 Aylık Hesap Hareketleri.exe 94 PID 1288 wrote to memory of 3100 1288 Aylık Hesap Hareketleri.exe 94 PID 1288 wrote to memory of 3100 1288 Aylık Hesap Hareketleri.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aylık Hesap Hareketleri.exe"C:\Users\Admin\AppData\Local\Temp\Aylık Hesap Hareketleri.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Aylık Hesap Hareketleri.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qrmBaaZPoFu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:180
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qrmBaaZPoFu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp73E3.tmp"2⤵
- Creates scheduled task(s)
PID:3100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 16762⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1288 -ip 12881⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5d5df361555c438e0c0553ed9424a315a
SHA13f3599b7632f230266620d96effcaf65ac94c3ec
SHA256f2dab1cf3eced12a763484bbbd280c16ff7e4eba4f7504aa0a45add569b633b2
SHA51235e51d945d73bab8b3334e95e2c5927a86fdc436e7376d46d415008331bd853c446264895861e1064580ff63ea1f101b4ac398f21cd239fd378452298a482a24
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD55635c04d4f1ca9dcc1f6cde473850a79
SHA1b44da47a1199de2d6b2d1860dcf02fdaf33c18a4
SHA256bee561d6c91bcf4333b04f1f62896e7d2e5e3a2d9aded6472616fd7735e8d1ec
SHA5120d20e8969037472b22799f2c35e7c840552574e3f373ff8d161c1b58504f89cda26dd68e5e43186c641c4d7f753947b06cd334f708b1d56a765d3bd6ebc5a53b