Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2023 07:48

General

  • Target

    Para Transferi Bilgilendirmesi-dekont.exe

  • Size

    893KB

  • MD5

    21d1df1da2e98a9ab9268712b8448e84

  • SHA1

    37c3233503068ba139bddcd9569ebaa068265590

  • SHA256

    a6aecca7d8f0cf861ae32b0ce54822e1d3c82e94685861b130c842f602b9d7db

  • SHA512

    b6eda1358566719b0bd5923caad17d3f678b816eff8bc613a1930ec0f83fe8a4ea65194a15ebf2fb1458b8889b369483e19107eac955e0ea0c380ff3c456bd63

  • SSDEEP

    24576:K5xolYQY65XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXA:dYkXXXXXXXXXXXXXXXXXXXXXXXXXXXXQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Para Transferi Bilgilendirmesi-dekont.exe
    "C:\Users\Admin\AppData\Local\Temp\Para Transferi Bilgilendirmesi-dekont.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • \??\c:\users\admin\appdata\local\temp\para transferi bilgilendirmesi-dekont.exe 
      "c:\users\admin\appdata\local\temp\para transferi bilgilendirmesi-dekont.exe "
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:892
      • \??\c:\users\admin\appdata\local\temp\para transferi bilgilendirmesi-dekont.exe 
        "c:\users\admin\appdata\local\temp\para transferi bilgilendirmesi-dekont.exe "
        3⤵
        • Executes dropped EXE
        PID:1656
      • \??\c:\users\admin\appdata\local\temp\para transferi bilgilendirmesi-dekont.exe 
        "c:\users\admin\appdata\local\temp\para transferi bilgilendirmesi-dekont.exe "
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1052
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2732
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2916
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2692
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2592
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2500
            • C:\Windows\SysWOW64\at.exe
              at 07:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:1048
              • C:\Windows\SysWOW64\at.exe
                at 07:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:1336
                • C:\Windows\SysWOW64\at.exe
                  at 07:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:2600

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          274KB

          MD5

          cef1aa1ee74f6a2a28044171206a2796

          SHA1

          42d14accd64b2dc044307805736805489a903dd1

          SHA256

          c480463abc1e73e04ecc270d5c5fcc8775e9e383b1ad7774bda69869de5b4d8a

          SHA512

          2afcf9b0cd67051c98a8c1dcd5390204217056688fec615f3f458a38a3250401f17fee254375580a95730e751d43ace9379eeffa09207da8da98de6393debd36

        • \??\PIPE\atsvc

          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • \Users\Admin\AppData\Local\Temp\para transferi bilgilendirmesi-dekont.exe 

          Filesize

          619KB

          MD5

          4783d50da091b2f50da381fd4a7b8e2d

          SHA1

          f9504f9cd2695f0ac818596f250a4fe1ef7ca866

          SHA256

          35eee52488a800617b5ba6e6b01f3de68cd89a248c078fcc8126fdb7e7849dfd

          SHA512

          396c4d55da768d43d238607b7e3ad46ce325ed906843245b03f56503498c451509d495c65672bde0d42833a45a77df762a715f15151937d5aa88ad3c78ad84f0

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          274KB

          MD5

          14b830b4552f61582f4440b712ee9af2

          SHA1

          74b5d677e14341d51af472a8673415fc1080896d

          SHA256

          5291cc6ac0d6d64f6f93bfd1bf9e6a13ab9f343e343a599e1bcd718dc8549d3f

          SHA512

          224ea6ea3a34f67646ed4aa6e515f6baefe26df371db94cbde2df1988987d7300638f22b9e898cec93466b40060b148f6b149fe75081e38fd001bf0f3334e86b

        • \Windows\system\explorer.exe

          Filesize

          274KB

          MD5

          725d21c558da9d5b59a17fb50d20818d

          SHA1

          f9cf43bbd58cd2b4804ddbd6b89655e08280e299

          SHA256

          c1c0f3e5f4ecaf4823b56fa63b82128b5b23381713f5cb88eb08bc58c36ec9e8

          SHA512

          8468bc7f8e8a92e81a429a5af5d04a21acdee7ccad449322db2c66d4de4220338148ea09edc55cddde20ee81582b35e99bf1de99afe0fd712534838bec62f337

        • \Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          4d0ce7408bcefada54781f8f526e9ffb

          SHA1

          7a252c77035f6fcff43684667ddd3bfc07b3a965

          SHA256

          17af968ba041b618f56dbb864278330d1ca5654f8e9f63d97452fbc8d4895f65

          SHA512

          df35ae429ad6dcc479c53bac9b1010da8b35c8187411ca8c99bc8a9f4f275e64a207196d866bba4b7c8bd8d7bdb8fe74c0c6aecf25b5a3ba1332fc1732a161bf

        • \Windows\system\svchost.exe

          Filesize

          274KB

          MD5

          01c17645364a0357a3c3587119a2a53a

          SHA1

          ecc184c6b773b32c4d62b9ba49249f2963405afd

          SHA256

          3c60d00e10fb5d7d1532ca96de414e3ef77cadeb20e604879edd015e75d0f0dc

          SHA512

          b5a99490a17feb06ac414084f7e76befcc1391b426efd06e68284693139e118d02fe41f9e1755db96d3bcdbe370707398ba4238d7ac281e8753df74c14c2dfa7

        • memory/892-106-0x0000000073B80000-0x000000007426E000-memory.dmp

          Filesize

          6.9MB

        • memory/892-13-0x0000000004CF0000-0x0000000004D30000-memory.dmp

          Filesize

          256KB

        • memory/892-90-0x0000000005100000-0x000000000517A000-memory.dmp

          Filesize

          488KB

        • memory/892-12-0x0000000073B80000-0x000000007426E000-memory.dmp

          Filesize

          6.9MB

        • memory/892-89-0x0000000000350000-0x000000000035A000-memory.dmp

          Filesize

          40KB

        • memory/892-11-0x0000000000120000-0x00000000001C0000-memory.dmp

          Filesize

          640KB

        • memory/892-88-0x0000000000290000-0x0000000000298000-memory.dmp

          Filesize

          32KB

        • memory/892-73-0x0000000073B80000-0x000000007426E000-memory.dmp

          Filesize

          6.9MB

        • memory/892-87-0x0000000000330000-0x0000000000348000-memory.dmp

          Filesize

          96KB

        • memory/892-78-0x0000000004CF0000-0x0000000004D30000-memory.dmp

          Filesize

          256KB

        • memory/1052-96-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1052-100-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1052-108-0x0000000073B80000-0x000000007426E000-memory.dmp

          Filesize

          6.9MB

        • memory/1052-107-0x0000000073B80000-0x000000007426E000-memory.dmp

          Filesize

          6.9MB

        • memory/1052-105-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1052-103-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1052-97-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1052-98-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1052-95-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1052-94-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1464-21-0x00000000027F0000-0x000000000282E000-memory.dmp

          Filesize

          248KB

        • memory/1464-0-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1464-84-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2500-77-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2500-83-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2592-76-0x0000000000800000-0x000000000083E000-memory.dmp

          Filesize

          248KB

        • memory/2592-74-0x0000000000800000-0x000000000083E000-memory.dmp

          Filesize

          248KB

        • memory/2692-82-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2692-65-0x0000000002D80000-0x0000000002DBE000-memory.dmp

          Filesize

          248KB

        • memory/2732-35-0x0000000002850000-0x000000000288E000-memory.dmp

          Filesize

          248KB

        • memory/2732-85-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2732-22-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2916-51-0x00000000026D0000-0x000000000270E000-memory.dmp

          Filesize

          248KB