Analysis Overview
SHA256
5c340f4ea2c37e9fbde26ec997989653563952b4dcfff6990fb1ab0a5301443b
Threat Level: Known bad
The file 5c340f4ea2c37e9fbde26ec997989653563952b4dcfff6990fb1ab0a5301443b was found to be: Known bad.
Malicious Activity Summary
AgentTesla
Suspicious use of SetThreadContext
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-02 01:08
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-02 01:08
Reported
2024-06-02 01:10
Platform
win7-20240220-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
AgentTesla
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2184 set thread context of 2520 | N/A | C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe
"C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
Network
Files
memory/2184-0-0x000007FEF5433000-0x000007FEF5434000-memory.dmp
memory/2184-1-0x00000000001A0000-0x00000000001AA000-memory.dmp
memory/2184-2-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp
memory/2184-3-0x000000001B1E0000-0x000000001B274000-memory.dmp
memory/2948-10-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2948-8-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2948-6-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2948-4-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2184-27-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp
memory/2520-26-0x000000007413E000-0x000000007413F000-memory.dmp
memory/2520-23-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2520-22-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2520-28-0x0000000074130000-0x000000007481E000-memory.dmp
memory/2520-25-0x0000000000400000-0x0000000000440000-memory.dmp
memory/2520-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2520-29-0x000000007413E000-0x000000007413F000-memory.dmp
memory/2520-30-0x0000000074130000-0x000000007481E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-02 01:08
Reported
2024-06-02 01:11
Platform
win10v2004-20240426-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
AgentTesla
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3980 set thread context of 3540 | N/A | C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe
"C:\Users\Admin\AppData\Local\Temp\YapiKrediInternetBankaciligi_Dekont_20240531_266_40240020.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 144.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.71.105.51.in-addr.arpa | udp |
Files
memory/3980-1-0x00007FFC538A3000-0x00007FFC538A5000-memory.dmp
memory/3980-0-0x0000024135590000-0x000002413559A000-memory.dmp
memory/3980-3-0x00007FFC538A0000-0x00007FFC54361000-memory.dmp
memory/3980-2-0x000002414FD30000-0x000002414FDC4000-memory.dmp
memory/3540-4-0x0000000000400000-0x0000000000440000-memory.dmp
memory/3540-6-0x00000000055C0000-0x0000000005B64000-memory.dmp
memory/3540-5-0x00000000750CE000-0x00000000750CF000-memory.dmp
memory/3540-7-0x0000000005190000-0x00000000051F6000-memory.dmp
memory/3540-8-0x00000000750C0000-0x0000000075870000-memory.dmp
memory/3980-9-0x00007FFC538A0000-0x00007FFC54361000-memory.dmp
memory/3540-10-0x0000000005F40000-0x0000000005F90000-memory.dmp
memory/3540-11-0x0000000006030000-0x00000000060C2000-memory.dmp
memory/3540-12-0x00000000061D0000-0x00000000061DA000-memory.dmp
memory/3540-13-0x00000000750CE000-0x00000000750CF000-memory.dmp
memory/3540-14-0x00000000750C0000-0x0000000075870000-memory.dmp