Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.pdf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift Mesaji.pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
Ziraat Bankasi Swift Mesaji.pdf.exe
-
Size
928KB
-
MD5
ff8c44307760d3f89e78a8a95980d6ea
-
SHA1
dd2421cc6fd60a4caadf8ec88f6635276550543b
-
SHA256
c19611873222bfc236a1eeab96287424c06a987a877c164d21c7354fe72108c3
-
SHA512
ebcadc9b92942dcc8f28e8f689290218f752cf80ce8620ae7ada371f5f3963cf5e6d5f2f021c42a8946ba4235096399ba297ec21070d96ece7e3ffe6ed3a7259
-
SSDEEP
24576:npp43ue2YKmNBRx6ajNlHgKUKV3hIgnYj:ppNYKWPweNl15CgnA
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exepid process 3460 Ziraat Bankasi Swift Mesaji.pdf.exe -
Drops file in System32 directory 1 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Supercandidly\Udlejningers.bln Ziraat Bankasi Swift Mesaji.pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exepid process 3920 Ziraat Bankasi Swift Mesaji.pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exeZiraat Bankasi Swift Mesaji.pdf.exepid process 3460 Ziraat Bankasi Swift Mesaji.pdf.exe 3920 Ziraat Bankasi Swift Mesaji.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exedescription pid process target process PID 3460 set thread context of 3920 3460 Ziraat Bankasi Swift Mesaji.pdf.exe Ziraat Bankasi Swift Mesaji.pdf.exe -
Drops file in Program Files directory 3 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\gammastraalernes\foundered.non Ziraat Bankasi Swift Mesaji.pdf.exe File opened for modification C:\Program Files (x86)\Common Files\frelse.pre Ziraat Bankasi Swift Mesaji.pdf.exe File opened for modification C:\Program Files (x86)\Common Files\preussiskes\vokalise.Nor135 Ziraat Bankasi Swift Mesaji.pdf.exe -
Drops file in Windows directory 2 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exedescription ioc process File opened for modification C:\Windows\resources\netkortet.ini Ziraat Bankasi Swift Mesaji.pdf.exe File opened for modification C:\Windows\Fonts\kompressor\fennoskandisk.ini Ziraat Bankasi Swift Mesaji.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exepid process 3460 Ziraat Bankasi Swift Mesaji.pdf.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Ziraat Bankasi Swift Mesaji.pdf.exedescription pid process target process PID 3460 wrote to memory of 3920 3460 Ziraat Bankasi Swift Mesaji.pdf.exe Ziraat Bankasi Swift Mesaji.pdf.exe PID 3460 wrote to memory of 3920 3460 Ziraat Bankasi Swift Mesaji.pdf.exe Ziraat Bankasi Swift Mesaji.pdf.exe PID 3460 wrote to memory of 3920 3460 Ziraat Bankasi Swift Mesaji.pdf.exe Ziraat Bankasi Swift Mesaji.pdf.exe PID 3460 wrote to memory of 3920 3460 Ziraat Bankasi Swift Mesaji.pdf.exe Ziraat Bankasi Swift Mesaji.pdf.exe PID 3460 wrote to memory of 3920 3460 Ziraat Bankasi Swift Mesaji.pdf.exe Ziraat Bankasi Swift Mesaji.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.pdf.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.pdf.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
44B
MD5ad691854b5e0587ed7af25c249a68fd5
SHA160a4465cfe7b6b663b9993fe958f8306de76d556
SHA256b20bf1c3b7b6a17271b6a463eaac81ac8d2debc47950479047cf14ac51ca04c8
SHA5122018e53a9c97641be6313912d3277f7aedc7788c74c0bd4574504892dc8ddeff9a206d59aa302c971a9a9e227a28055e790a94f747f3d5ab7762d2f64fb3d9b3