Overview
overview
10Static
static
303.10.2024...B).msg
windows7-x64
503.10.2024...B).msg
windows10-2004-x64
3unnamedtrd.png
windows7-x64
3unnamedtrd.png
windows10-2004-x64
3Ödeme kop...df.rar
windows7-x64
3Ödeme kop...df.rar
windows10-2004-x64
3Ödeme kop...df.exe
windows7-x64
3Ödeme kop...df.exe
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
03.10.2024 Tarihli Ödemeye İlişkin Dekontlar (490 KB).msg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03.10.2024 Tarihli Ödemeye İlişkin Dekontlar (490 KB).msg
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
unnamedtrd.png
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
unnamedtrd.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ödeme kopyası.pdf.rar
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ödeme kopyası.pdf.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ödeme kopyası.pdf.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Ödeme kopyası.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
Ödeme kopyası.pdf.exe
-
Size
1.4MB
-
MD5
cb9df2754f620ea0739b3dd1e3e3422f
-
SHA1
579286334ac2305fe6fd5419e7b046d96e463033
-
SHA256
e6b72ddd31a53809013959c4d33297e28d76c73dfa9fad878f8bd64d69bae0b2
-
SHA512
9b70944f5327c06286e4231be84c7259dd92dcfc528bb8b31eb23587adba0d7ce67e6435f93ca7c39f6093f3f26e98288ef1c3cc80608ef5873acf433cceb9de
-
SSDEEP
24576:j1eTYAK4egHCAjifn/Na5OMiEX6/QgcixPMRNglNq7:5e/K4IAgcix4NgTq7
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4924 created 3432 4924 Ödeme kopyası.pdf.exe 56 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bazrfsrpjr = "C:\\Users\\Admin\\AppData\\Roaming\\Bazrfsrpjr.exe" Ödeme kopyası.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4924 set thread context of 1900 4924 Ödeme kopyası.pdf.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ödeme kopyası.pdf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4924 Ödeme kopyası.pdf.exe 1900 InstallUtil.exe 1900 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4924 Ödeme kopyası.pdf.exe Token: SeDebugPrivilege 4924 Ödeme kopyası.pdf.exe Token: SeDebugPrivilege 1900 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86 PID 4924 wrote to memory of 1900 4924 Ödeme kopyası.pdf.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Ödeme kopyası.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ödeme kopyası.pdf.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-