Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe
Resource
win10v2004-20241007-en
General
-
Target
Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe
-
Size
821KB
-
MD5
7c36f1554bb662abddb2fafb5db3037d
-
SHA1
4d2b146919805242a1699139d2937bae4fddfd4b
-
SHA256
5f93d1ba8286162e4e7ebe907745b186d2301534fd8b39a84f129f3857f16c30
-
SHA512
caa4b4b05fdd1a5b68979ed0c2388c727dd3d89d34a2351e7e392e1dd1764a87a0af1106e7beaa65a287cd625088daeb9ccfcad4fed8ca39b273fa7142c53665
-
SSDEEP
24576:PBKn35eX+HnjaKB2LJKI923eTuOmvzzx428hYTGu:EpjHnj3B2VKI92uuOmrOSTGu
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
redline
FOZ
212.162.149.53:36014
Extracted
xworm
5.0
212.162.149.53:7071
9GNxvcpH1EHQrLdj
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca4-42.dat family_xworm behavioral2/memory/3136-57-0x0000000000FE0000-0x0000000000FF0000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca7-61.dat family_redline behavioral2/memory/3972-65-0x0000000000080000-0x00000000000D2000-memory.dmp family_redline -
Redline family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1536 powershell.exe 3884 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk apihost.exe -
Executes dropped EXE 3 IoCs
pid Process 3136 XClient.exe 3972 build.exe 4672 apihost.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 XClient.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 XClient.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 XClient.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" apihost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 688 schtasks.exe 3880 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3136 XClient.exe 4672 apihost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 1536 powershell.exe 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 1536 powershell.exe 3136 XClient.exe 3972 build.exe 3972 build.exe 3972 build.exe 3136 XClient.exe 3884 powershell.exe 3884 powershell.exe 4672 apihost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 3136 XClient.exe Token: SeDebugPrivilege 3972 build.exe Token: SeDebugPrivilege 3884 powershell.exe Token: SeDebugPrivilege 4672 apihost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3136 XClient.exe 3136 XClient.exe 4672 apihost.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1536 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 89 PID 2644 wrote to memory of 1536 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 89 PID 2644 wrote to memory of 1536 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 89 PID 2644 wrote to memory of 3880 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 91 PID 2644 wrote to memory of 3880 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 91 PID 2644 wrote to memory of 3880 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 91 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 2644 wrote to memory of 316 2644 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 93 PID 316 wrote to memory of 3136 316 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 94 PID 316 wrote to memory of 3136 316 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 94 PID 316 wrote to memory of 3972 316 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 95 PID 316 wrote to memory of 3972 316 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 95 PID 316 wrote to memory of 3972 316 Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe 95 PID 3136 wrote to memory of 3884 3136 XClient.exe 98 PID 3136 wrote to memory of 3884 3136 XClient.exe 98 PID 3136 wrote to memory of 688 3136 XClient.exe 99 PID 3136 wrote to memory of 688 3136 XClient.exe 99 PID 3136 wrote to memory of 4672 3136 XClient.exe 102 PID 3136 wrote to memory of 4672 3136 XClient.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 XClient.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 XClient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YkxAHNcqEmoeLS.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YkxAHNcqEmoeLS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD89D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe" /st 08:07 /du 23:59 /sc daily /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:688
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4672
-
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
18KB
MD5c7bac0105b8e08ec7d9e6ffe3cb6cfbb
SHA17a7eff82b31af4bc0f1d9519c660da49bfd15777
SHA256fe3e7fb33e8acd7e50913befb567e331b8381986d3c4d206be395c6710b4c10d
SHA5121bb875588ba21939490b151744f2714f0b7e4c9db06e80f63e01db26eabb8ea4dbaed00662957618c34a7fb057d9c04d26a3652d6944b609c105dbe5cf1b6c31
-
Filesize
40KB
MD51c5cf825e29b63a62c3c8b1589d51a1e
SHA1ea4f1dceeeea35b6bd17f4040511bbd0341246a8
SHA256d868406f1fdc6a5c15a70f03f6279fb8a3fe190ea5a4911bf6839fc483c753b0
SHA512c780aff70b930ea221ffd96081c02116f76d2c7b20590fff6ab04038e2aef50ad57eb8f28a67c4dfdb6a00e3fe393e1238d448c3f346585242ee18d180203fd2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
300KB
MD51ed2ecae05aaa1c505136f5252287cc7
SHA12c73c09437c4c1d5e90013a6ca7a65ac0a5fadc5
SHA256d771f70ba342e5d4cd7f129a4a2b4a6c6c7293233135f266db33f356986a70f9
SHA512ca82139310ea62ec8703f6fcb19d843644a5ce40323e8f7857c9fd3173bb0796eb20f9002209b9fcbfa7ce9858fe3b932e070f8449bc2736b6712d39515d9219
-
Filesize
1KB
MD5b25ec9b1ea0a6d352fa497c2454cd4cd
SHA192bb2dfe89353d50eef038b16fd0da59f2c10ee2
SHA2560ae217cc71c89f5269f01951a90dfbcff8ecfa68b8d1f68f454134cb361d2bb2
SHA51277e72f3c7f737d694014f4a870562652a1f831772de3bd82567638c3b0025f18bd229456a59fc10a7e73e50c96434538b80acbae497e385d1bf0feed2885cb9d
-
Filesize
771B
MD57a6f6e6cb345e2ab6f31a52227ce1f98
SHA1b1a213f8dd7ab0bd24971d227957141536229874
SHA256f6c7dff5bb39edb168398ebdd26533786fa16659c80163c9fae41add704d61f7
SHA51280f01f6c5663f068b84fbd62174b905c7821a04f269d1d101fffa2c7bcfca104e8da2ca1e21a1df53e605c88d36751cdc53b171e4d095f218841b9814a7a74c6