Analysis
-
max time kernel
138s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20240709-en
General
-
Target
hesaphareketi-01.exe
-
Size
1.4MB
-
MD5
7ccb3c07bf2918bbcad959e27e17f083
-
SHA1
978f8c090da4173cdf2544b38b5e53aa6fc2fab7
-
SHA256
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388
-
SHA512
22d2552eb839a9643cd939acf70501b91a933b44c29fda7ccfc1bf5c3b1da44229e87dca3177424c23d30b61f76cead0dcd2c25bced77cc141a5ebd6f29c56cc
-
SSDEEP
24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8aGM8k0V0F0t0Kta4Plh3:1TvC/MTQYxsWR7aGM8Nt0aXd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.vbs svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2136 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\directory\svchost.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2136 set thread context of 3116 2136 svchost.exe RegSvcs.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
hesaphareketi-01.exesvchost.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hesaphareketi-01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 3116 RegSvcs.exe 3116 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
svchost.exepid process 2136 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 3116 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
hesaphareketi-01.exesvchost.exepid process 2584 hesaphareketi-01.exe 2584 hesaphareketi-01.exe 2136 svchost.exe 2136 svchost.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
hesaphareketi-01.exesvchost.exepid process 2584 hesaphareketi-01.exe 2584 hesaphareketi-01.exe 2136 svchost.exe 2136 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
hesaphareketi-01.exesvchost.exedescription pid process target process PID 2584 wrote to memory of 2136 2584 hesaphareketi-01.exe svchost.exe PID 2584 wrote to memory of 2136 2584 hesaphareketi-01.exe svchost.exe PID 2584 wrote to memory of 2136 2584 hesaphareketi-01.exe svchost.exe PID 2136 wrote to memory of 3116 2136 svchost.exe RegSvcs.exe PID 2136 wrote to memory of 3116 2136 svchost.exe RegSvcs.exe PID 2136 wrote to memory of 3116 2136 svchost.exe RegSvcs.exe PID 2136 wrote to memory of 3116 2136 svchost.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\directory\svchost.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nonsubmergedFilesize
28KB
MD55e6859127c5512b93d242e69968504f2
SHA160f72690bcfb2d2d0abcab606b7dc6df16976f26
SHA25602719b524b7ad3a5ee7d5812b3165cbdcce3f33463f75fd4282074549914b443
SHA51277da1ba3121320240112ccc3c1a56535e010bc59113f19da9655074d7a32798644ef6f432f8445cab5d56d59c3fdc949b17c2bcee229542910634f1a778917b3
-
C:\Users\Admin\AppData\Local\Temp\ophiolatrousFilesize
265KB
MD553cb22f6455800a3ba89dad4e91d8ab7
SHA17c15e05820248e34c0f339adf7fd4d0065cda14e
SHA256c3bf329a7a6d009dde75bfdee126473a9e498ce8246c7196717465cc90d243ea
SHA51250b93d0292c5ca0d4bb976cbcb1713d0d4bcceb5eb0de5b9487a826ccb018082729c3c3cf87fa634699e7e03ee2f8cfdd977d774248ffdaf11f37b2c066a3b14
-
C:\Users\Admin\AppData\Local\directory\svchost.exeFilesize
1.4MB
MD57ccb3c07bf2918bbcad959e27e17f083
SHA1978f8c090da4173cdf2544b38b5e53aa6fc2fab7
SHA256e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388
SHA51222d2552eb839a9643cd939acf70501b91a933b44c29fda7ccfc1bf5c3b1da44229e87dca3177424c23d30b61f76cead0dcd2c25bced77cc141a5ebd6f29c56cc
-
memory/2584-11-0x0000000003840000-0x0000000003844000-memory.dmpFilesize
16KB
-
memory/3116-30-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/3116-31-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/3116-32-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/3116-33-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/3116-34-0x0000000073F4E000-0x0000000073F4F000-memory.dmpFilesize
4KB
-
memory/3116-35-0x0000000002FE0000-0x0000000003036000-memory.dmpFilesize
344KB
-
memory/3116-37-0x0000000005BB0000-0x0000000006154000-memory.dmpFilesize
5.6MB
-
memory/3116-36-0x0000000073F40000-0x00000000746F0000-memory.dmpFilesize
7.7MB
-
memory/3116-38-0x0000000005520000-0x0000000005574000-memory.dmpFilesize
336KB
-
memory/3116-42-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-92-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-98-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-96-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-204-0x0000000073F40000-0x00000000746F0000-memory.dmpFilesize
7.7MB
-
memory/3116-94-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-90-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-88-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-86-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-84-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-82-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-80-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-78-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-76-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-74-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-72-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-70-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-68-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-64-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-63-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-58-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-56-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-54-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-52-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-50-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-48-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-46-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-44-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-40-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-39-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-66-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-60-0x0000000005520000-0x000000000556F000-memory.dmpFilesize
316KB
-
memory/3116-1136-0x0000000073F40000-0x00000000746F0000-memory.dmpFilesize
7.7MB
-
memory/3116-1137-0x0000000005770000-0x00000000057D6000-memory.dmpFilesize
408KB
-
memory/3116-1138-0x0000000006730000-0x00000000067C2000-memory.dmpFilesize
584KB
-
memory/3116-1140-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/3116-1141-0x0000000073F40000-0x00000000746F0000-memory.dmpFilesize
7.7MB