Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
Zeki Hidrolik Fiyat talebi_Ticari liste.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Zeki Hidrolik Fiyat talebi_Ticari liste.exe
Resource
win10v2004-20230824-en
General
-
Target
Zeki Hidrolik Fiyat talebi_Ticari liste.exe
-
Size
700KB
-
MD5
02b8fd7c6ea136ebfb47b2ff2f0d1a72
-
SHA1
370cdb58d4e273b35f6e38ffc694473143cf9395
-
SHA256
d4be953d9e9504303622fe8c83eb835c8dc6ce07a051ad145a4b419cab8b8566
-
SHA512
bedc52d810473ec5174f449a2eba39f4682d6707ec70649a0e48d1ed8bce1bba60f541d52f014e2591f6487db07b4624eaac7ab7cd64f1ec6504bd2df3d522ae
-
SSDEEP
12288:8ZFpdY/Rmisoh6VO5W/eTraTuiSn1QbFrdn:oasoT5W/I21S1QbFrR
Malware Config
Extracted
Protocol: smtp- Host:
mail.eprl.pt - Port:
587 - Username:
[email protected] - Password:
6EO##P9jkTTY
Extracted
agenttesla
Protocol: smtp- Host:
mail.eprl.pt - Port:
587 - Username:
[email protected] - Password:
6EO##P9jkTTY - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Zeki Hidrolik Fiyat talebi_Ticari liste.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe caspol.exe -
Loads dropped DLL 2 IoCs
pid Process 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org 11 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2732 caspol.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 2732 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2464 set thread context of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 caspol.exe 2732 caspol.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2732 caspol.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30 PID 2464 wrote to memory of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30 PID 2464 wrote to memory of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30 PID 2464 wrote to memory of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30 PID 2464 wrote to memory of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30 PID 2464 wrote to memory of 2732 2464 Zeki Hidrolik Fiyat talebi_Ticari liste.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zeki Hidrolik Fiyat talebi_Ticari liste.exe"C:\Users\Admin\AppData\Local\Temp\Zeki Hidrolik Fiyat talebi_Ticari liste.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\Zeki Hidrolik Fiyat talebi_Ticari liste.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b8992e497d57001ddf100f9c397fcef5
SHA1e26ddf101a2ec5027975d2909306457c6f61cfbd
SHA25698bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
SHA5128823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c
-
Filesize
11KB
MD5b8992e497d57001ddf100f9c397fcef5
SHA1e26ddf101a2ec5027975d2909306457c6f61cfbd
SHA25698bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
SHA5128823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c
-
Filesize
11KB
MD5b8992e497d57001ddf100f9c397fcef5
SHA1e26ddf101a2ec5027975d2909306457c6f61cfbd
SHA25698bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
SHA5128823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c