Analysis
-
max time kernel
102s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 08:45
Behavioral task
behavioral1
Sample
Satınalma Siparişi Spesifikasyonu.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
edit.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
mscorlib.dll
Resource
win10v2004-20250314-en
General
-
Target
Satınalma Siparişi Spesifikasyonu.exe
-
Size
55KB
-
MD5
cf3730065ea41e334dd1c0cd9a9e645f
-
SHA1
ca0ade25c36cd37a3dea4c8baf1e572622b96ee8
-
SHA256
b04ea3c83515c3daf2de76c18e72cb87c0772746ec7369acce8212891d0d8997
-
SHA512
63d5cc1d90d9ef97fc856b0b7cd8b6c4ebedaf2248b85c1f4754b4ace9ef5f9bbdfbaf32df2f6a92527334e3dc4fafa3a57d3df7242e31a6dea6ef919a82e06a
-
SSDEEP
768:GhrxNIkm1OegISRP5RHKl9tI5rMJSPcY0ur8b64W/iIAjSHWUF34BYixxR62E1:IxmkVgqRIe5QcPcHur8iGj+WUFIB7XYz
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7727146830:AAHPH5G1BgMzNy35r8HXC1DXB8AIv-I_4cA/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Satınalma Siparişi Spesifikasyonu = "cmd.exe /C start \"\" /D \"C:\\Users\\Admin\\SystemRootDoc\" \"C:\\Users\\Admin\\SystemRootDoc\\Satınalma Siparişi Spesifikasyonu.exe\"" Satınalma Siparişi Spesifikasyonu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5960 set thread context of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 AddInProcess32.exe 224 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5960 Satınalma Siparişi Spesifikasyonu.exe Token: SeDebugPrivilege 224 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 5960 wrote to memory of 224 5960 Satınalma Siparişi Spesifikasyonu.exe 92 PID 32 wrote to memory of 4764 32 cmd.exe 95 PID 32 wrote to memory of 4764 32 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Satınalma Siparişi Spesifikasyonu.exe"C:\Users\Admin\AppData\Local\Temp\Satınalma Siparişi Spesifikasyonu.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /C start "" /D "C:\Users\Admin\SystemRootDoc" "C:\Users\Admin\SystemRootDoc\Sat1nalma Sipari_i Spesifikasyonu.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\system32\cmd.execmd.exe /C start "" /D "C:\Users\Admin\SystemRootDoc" "C:\Users\Admin\SystemRootDoc\Sat1nalma Sipari_i Spesifikasyonu.exe"2⤵PID:4764
-