Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 01:16
Behavioral task
behavioral1
Sample
KTR Bilgisayar Yönetimi/KTR Bilgisayar Yönetimi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KTR Bilgisayar Yönetimi/KTR Bilgisayar Yönetimi.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
KTR Bilgisayar Yönetimi/Kullanım Kılavuzu.pdf
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
KTR Bilgisayar Yönetimi/Kullanım Kılavuzu.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
KTR Bilgisayar Yönetimi/VirusTotal/VirusTotal.pdf
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
KTR Bilgisayar Yönetimi/VirusTotal/VirusTotal.pdf
Resource
win10v2004-20241007-en
General
-
Target
KTR Bilgisayar Yönetimi/KTR Bilgisayar Yönetimi.exe
-
Size
11.8MB
-
MD5
eb7c879f11b54f291ce0126d62dcf341
-
SHA1
a14c6530b24916eea2bd2237b790a338df6a7bea
-
SHA256
209f83f34903c8db51f8ea1b54c8f0093b612447d31908bac081372377d89c06
-
SHA512
c453c588b9f5f522ccc2f42e255f68ff38e984810def9ec4c6ee50b6407ac19df8994698120b3482dd29f3425f0e9d36afe872e0093306c804ee88c4c16ac9ce
-
SSDEEP
196608:CSQSap4bqiip34pkr2dY/aBcjJOBHOBIQBajMtWvoJiLE1+XgRKz89G/4ZSb0Fu5:wkqiiKpkr2dY/aBcjJOBHOBIQBajMtWb
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
Processes:
KTR Bilgisayar Yönetimi.exepid process 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe 4844 KTR Bilgisayar Yönetimi.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/4844-15-0x0000000005AC0000-0x0000000005B26000-memory.dmp agile_net behavioral2/memory/4844-27-0x0000000006310000-0x0000000006332000-memory.dmp agile_net -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
KTR Bilgisayar Yönetimi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KTR Bilgisayar Yönetimi.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
KTR Bilgisayar Yönetimi.exepid process 4844 KTR Bilgisayar Yönetimi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
KTR Bilgisayar Yönetimi.exedescription pid process Token: SeDebugPrivilege 4844 KTR Bilgisayar Yönetimi.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
KTR Bilgisayar Yönetimi.exepid process 4844 KTR Bilgisayar Yönetimi.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
KTR Bilgisayar Yönetimi.exepid process 4844 KTR Bilgisayar Yönetimi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KTR Bilgisayar Yönetimi\KTR Bilgisayar Yönetimi.exe"C:\Users\Admin\AppData\Local\Temp\KTR Bilgisayar Yönetimi\KTR Bilgisayar Yönetimi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD574887ca999f4b8ffffe5cf8332228a97
SHA1a8ba417a457c8e7c3249c5886d2b557069e6ff83
SHA25654903acc19ebb20f8baa54f7762321d9fdbdaef33c65810f514f13c83274ad48
SHA5129d44835d57674f2cac1469b614d8702d215ba08808cc5748d92699a979d9b2135b9211984e90c42ea3c9e40ab4c04181fa7bca81a93b891da1ad634a45decc19
-
Filesize
1KB
MD53484fc718591b1bc922890aa43c55084
SHA1dbdf7a239f5c41e5fe659e56a6dd42e892d6c1c7
SHA2566dd23f620a9b78941e5ae2b7cf8de1a83a3cc0367d2dd31d456162522c4f9c89
SHA512e00ac233dfff6bf17515d1c38d0c3b0f132bebbfa57f8fb74e1903d16239332b43f80bce12b3091ff277be2877669837eeb8f3a6046a471a53e53456947642c3
-
Filesize
1KB
MD5e10fba65e25939099efc1a1162417a38
SHA16caa91c88d255dd6ea5bb774219e0c162350f0bc
SHA256634d7e9ba6e90b5fab74ea3e8d05d8b341be5e69c1175c4f62d99a0015e76a8d
SHA5126a8b3d8bcabb0f505db687e58f9fe19df00a98ebe4b1e49f5e19bbef3ad431e085dfd16e0f56acea5504df5ba606e0d4c3510e0de00ec224d90fb224090cdc7c