Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
ORDER LİSTESİ 3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ORDER LİSTESİ 3.exe
Resource
win10v2004-20240802-en
General
-
Target
ORDER LİSTESİ 3.exe
-
Size
58KB
-
MD5
04140d43f8950a9f31832b98f1fee497
-
SHA1
99b9c1fc286a5f8680d7256488a1b8289bc63f7b
-
SHA256
e34846ea6a307cbb749dcf880d83378a592e87b658dd30b4a761e561df78194c
-
SHA512
50ac9b7b208688679157a3c058fe2a46ed4cc9e24d2972c252c10c7c62e629448ece8d7dda8b130990273e57f02ccbc7a60a4b1de535472a925b11316949217e
-
SSDEEP
1536:KQ5Wjncz4iijM3CEF/7GmqbMY7usiY9hkX:r5Wjcz4iiA7GmCMY7pdkX
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 960 set thread context of 1124 960 ORDER LİSTESİ 3.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER LİSTESİ 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 960 ORDER LİSTESİ 3.exe 960 ORDER LİSTESİ 3.exe 960 ORDER LİSTESİ 3.exe 960 ORDER LİSTESİ 3.exe 1124 aspnet_compiler.exe 1124 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 960 ORDER LİSTESİ 3.exe Token: SeDebugPrivilege 1124 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1124 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 960 wrote to memory of 1620 960 ORDER LİSTESİ 3.exe 93 PID 960 wrote to memory of 1620 960 ORDER LİSTESİ 3.exe 93 PID 960 wrote to memory of 1620 960 ORDER LİSTESİ 3.exe 93 PID 960 wrote to memory of 2580 960 ORDER LİSTESİ 3.exe 94 PID 960 wrote to memory of 2580 960 ORDER LİSTESİ 3.exe 94 PID 960 wrote to memory of 2580 960 ORDER LİSTESİ 3.exe 94 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95 PID 960 wrote to memory of 1124 960 ORDER LİSTESİ 3.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER LİSTESİ 3.exe"C:\Users\Admin\AppData\Local\Temp\ORDER LİSTESİ 3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1124
-