Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
FaturaBildirim.exe
Resource
win7-20240221-en
General
-
Target
FaturaBildirim.exe
-
Size
676KB
-
MD5
c7be962ea1dde7fb4ae315d7c69a7988
-
SHA1
a24475c78c57873d495f4bcb14b71246e050add6
-
SHA256
179e544a547fd06c8af3d0aa5160448c1acf22e0d0343832097788d916051570
-
SHA512
6546d783142c3b7db898d67dd74413c7bf675b8837bb07100849d2160d8a7773e6d843cb69f8c1ead1025a9a0e407b03573ff0e05ca1cb5fc5e18909861d8d26
-
SSDEEP
12288:olYifTSceFntlMDfhbnOn+jcfwi+jh7dMLB4M/qFHpEDepHz8M4H0GHhkR:nilItlIVe+ZiQB6/qFwEw8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2348 powershell.exe 2428 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
FaturaBildirim.exedescription pid process target process PID 2724 set thread context of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
FaturaBildirim.exeFaturaBildirim.exepowershell.exepowershell.exepid process 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 2724 FaturaBildirim.exe 1628 FaturaBildirim.exe 1628 FaturaBildirim.exe 2428 powershell.exe 2348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
FaturaBildirim.exeFaturaBildirim.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2724 FaturaBildirim.exe Token: SeDebugPrivilege 1628 FaturaBildirim.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
FaturaBildirim.exepid process 1628 FaturaBildirim.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
FaturaBildirim.exedescription pid process target process PID 2724 wrote to memory of 2348 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2348 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2348 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2348 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2428 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2428 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2428 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2428 2724 FaturaBildirim.exe powershell.exe PID 2724 wrote to memory of 2484 2724 FaturaBildirim.exe schtasks.exe PID 2724 wrote to memory of 2484 2724 FaturaBildirim.exe schtasks.exe PID 2724 wrote to memory of 2484 2724 FaturaBildirim.exe schtasks.exe PID 2724 wrote to memory of 2484 2724 FaturaBildirim.exe schtasks.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe PID 2724 wrote to memory of 1628 2724 FaturaBildirim.exe FaturaBildirim.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FaturaBildirim.exe"C:\Users\Admin\AppData\Local\Temp\FaturaBildirim.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FaturaBildirim.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\apqOjuQgh.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\apqOjuQgh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4386.tmp"2⤵
- Creates scheduled task(s)
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\FaturaBildirim.exe"C:\Users\Admin\AppData\Local\Temp\FaturaBildirim.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568d6d52073f20b09b17ee2fe71b34057
SHA1527ff54060a7cd36f824d89b2561dbb3a0ac9662
SHA2567b9bb9cb1e917e1867ba8bc76d17ad93050781924fc40e26ae09bae51dea25d3
SHA512bdaaab95f784544c7cd6b58b5f4ba7d0980d77c42654d8402f89fab4934f5643575f1760b2adfa9b37ddf38ded388a3e23ce40bd928d570dade6f5b670c9a456
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1C28G9YNYCGK14VMA459.temp
Filesize7KB
MD549826421d14c8a981a9158249f647bb4
SHA1131110454edde5490d8a145e53e07bcbfca3547a
SHA256db9356b6fadea3d3f59e58eb3dd76d7ee4f6bcb51fc8e7c081cde43cf2519e12
SHA5128868b1e03e11f18494af25fd7499c55ad8b62a954116b7947d1f36710273c4b355a8a79d3bf2ab711b2e37b1a65db9f373ec54bca711cd4d9bc22e091d98515e