Analysis
-
max time kernel
95s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
Ödeme kopyası.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ödeme kopyası.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
Ödeme kopyası.pdf.exe
-
Size
1.4MB
-
MD5
cb9df2754f620ea0739b3dd1e3e3422f
-
SHA1
579286334ac2305fe6fd5419e7b046d96e463033
-
SHA256
e6b72ddd31a53809013959c4d33297e28d76c73dfa9fad878f8bd64d69bae0b2
-
SHA512
9b70944f5327c06286e4231be84c7259dd92dcfc528bb8b31eb23587adba0d7ce67e6435f93ca7c39f6093f3f26e98288ef1c3cc80608ef5873acf433cceb9de
-
SSDEEP
24576:j1eTYAK4egHCAjifn/Na5OMiEX6/QgcixPMRNglNq7:5e/K4IAgcix4NgTq7
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2904 created 3504 2904 Ödeme kopyası.pdf.exe 56 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bazrfsrpjr = "C:\\Users\\Admin\\AppData\\Roaming\\Bazrfsrpjr.exe" Ödeme kopyası.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2904 set thread context of 2836 2904 Ödeme kopyası.pdf.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ödeme kopyası.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2904 Ödeme kopyası.pdf.exe 2836 InstallUtil.exe 2836 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2904 Ödeme kopyası.pdf.exe Token: SeDebugPrivilege 2904 Ödeme kopyası.pdf.exe Token: SeDebugPrivilege 2836 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85 PID 2904 wrote to memory of 2836 2904 Ödeme kopyası.pdf.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Ödeme kopyası.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ödeme kopyası.pdf.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-