Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 08:45
Behavioral task
behavioral1
Sample
Satınalma Siparişi Spesifikasyonu.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
edit.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
mscorlib.dll
Resource
win10v2004-20250314-en
General
-
Target
edit.dll
-
Size
6.3MB
-
MD5
4e579141c090b55f8fcfac304bcba923
-
SHA1
69f39a145cc4c99d9e1861b53684c7b3144fff13
-
SHA256
85c2a2e3ee850092e4eb62f7f08165bc4883cd36c30b31dc63b57ccbf5f83fbb
-
SHA512
7223f8891e800c6c2e64ef6b939d7d4aa54ed3efe41f414b72b04ab14abac0a53d77a9bba3caf73b0b34287fcd79d25fce204a4cfd4f2986ae1708fa605ebd32
-
SSDEEP
49152:6jI+/FaA3QOruUbRvAV+g16jzDHvAeOMSoSkW0Ly2lUhNT8298T0w4YcUiImewIh:peNrulq0ov8n90HoIC2D/Gx9q
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7727146830:AAHPH5G1BgMzNy35r8HXC1DXB8AIv-I_4cA/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE 1 IoCs
pid Process 5472 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32 = "cmd.exe /C start \"\" /D \"C:\\Users\\Admin\\SystemRootDoc\" \"C:\\Users\\Admin\\SystemRootDoc\\rundll32.exe\"" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5396 set thread context of 5848 5396 rundll32.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5848 AddInProcess32.exe 5848 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5396 rundll32.exe Token: SeDebugPrivilege 5848 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 5396 wrote to memory of 5848 5396 rundll32.exe 97 PID 2468 wrote to memory of 2516 2468 cmd.exe 99 PID 2468 wrote to memory of 2516 2468 cmd.exe 99 PID 2516 wrote to memory of 5472 2516 cmd.exe 100 PID 2516 wrote to memory of 5472 2516 cmd.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edit.dll,#11⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /C start "" /D "C:\Users\Admin\SystemRootDoc" "C:\Users\Admin\SystemRootDoc\rundll32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\cmd.execmd.exe /C start "" /D "C:\Users\Admin\SystemRootDoc" "C:\Users\Admin\SystemRootDoc\rundll32.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\SystemRootDoc\rundll32.exe"C:\Users\Admin\SystemRootDoc\rundll32.exe"3⤵
- Executes dropped EXE
PID:5472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ba32bb24b7da23bd7ee7ae4b576338cd
SHA117731367250361c6b1aaf24f988b8dd1150b1e92
SHA2567cf4535e85ec02365c54bf460992344fe1e319381e794e51a7ce0f9cb0438929
SHA5124317c083c491e74ef7e1ad30d79164b3d6ba360f3b83a88d220b21385837049a33c3023c5f9d10c42980c45fecc747d271263242976435abab7612c26e486be4
-
Filesize
70KB
MD5ef3179d498793bf4234f708d3be28633
SHA1dd399ae46303343f9f0da189aee11c67bd868222
SHA256b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa
SHA51202aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e