Windows Analysis Report Ziraat Bankas#U0131 Swift Mesaj#U0131.exe

Overview

General Information

Sample Name: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Analysis ID: 458932
MD5: 680f6c1fb95c2a1e1fff056a7b40eaa6
SHA1: d56bb135538fd65ef001ffe56aff478305f924ad
SHA256: 5a0c8ee77f3b3a456846d43f1de0de06123c6e5bd545ee1c4130c846d67ef328
Tags: exenull
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

AV Detection:

barindex
Found malware configuration
Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info@floragumruk.com.tr", "Password": "A48vLCL194bD", "Host": "mail.floragumruk.com.tr"}
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Roaming\EsckCcRbv.exe Metadefender: Detection: 48% Perma Link
Source: C:\Users\user\AppData\Roaming\EsckCcRbv.exe ReversingLabs: Detection: 82%
Multi AV Scanner detection for submitted file
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Virustotal: Detection: 64% Perma Link
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Metadefender: Detection: 48% Perma Link
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe ReversingLabs: Detection: 82%
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Roaming\EsckCcRbv.exe Joe Sandbox ML: detected
Machine Learning detection for sample
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8

Compliance:

barindex
Uses 32bit PE files
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49728 -> 37.230.104.41:587
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.5:49728 -> 37.230.104.41:587
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AEROTEK-ASTR AEROTEK-ASTR
Uses SMTP (mail sending)
Source: global traffic TCP traffic: 192.168.2.5:49728 -> 37.230.104.41:587
Source: unknown DNS traffic detected: queries for: mail.floragumruk.com.tr
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp String found in binary or memory: http://cLLRlW.com
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmp String found in binary or memory: http://floragumruk.com.tr
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmp String found in binary or memory: http://mail.floragumruk.com.tr
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmp, Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp String found in binary or memory: https://V0OB6VWwZnBYDjMQY.com
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Installs a global keyboard hook
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Windows user hook set: 0 keyboard low level C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Jump to behavior
Creates a window with clipboard capturing capabilities
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior

System Summary:

barindex
.NET source code contains very large array initializations
Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bADD87429u002dC3E7u002d4A62u002d8EF3u002d75577D8941FFu007d/A3A30B0Au002dE6F8u002d41C3u002dA5B5u002d2EECAE7566D2.cs Large array initialization: .cctor: array initializer size 11942
Detected potential crypto function
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FD3268 8_2_00FD3268
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FD7BC0 8_2_00FD7BC0
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FDC798 8_2_00FDC798
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FD8B87 8_2_00FD8B87
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FD6490 8_2_00FD6490
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_010CE252 8_2_010CE252
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_010CDAE8 8_2_010CDAE8
PE file contains strange resources
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: EsckCcRbv.exe.1.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000001.00000000.218129864.0000000001032000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameEncoderFallbackBuff.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.487225265.00000000008D2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameEncoderFallbackBuff.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.487483640.0000000000CF8000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.490184039.0000000001220000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamemscorrc.dllT vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp Binary or memory string: OriginalFilenameAKtSoDcCZtIweTlXzHwVfUdzYJWIylpU.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.488203851.0000000000E00000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamewshom.ocx vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Binary or memory string: OriginalFilenameEncoderFallbackBuff.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Uses 32bit PE files
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: EsckCcRbv.exe.1.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@6/4@2/1
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File created: C:\Users\user\AppData\Roaming\EsckCcRbv.exe Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5336:120:WilError_01
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Mutant created: \Sessions\1\BaseNamedObjects\wjgvxdnXLAgNsj
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File created: C:\Users\user\AppData\Local\Temp\tmpC068.tmp Jump to behavior
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Virustotal: Detection: 64%
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Metadefender: Detection: 48%
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe ReversingLabs: Detection: 82%
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File read: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe 'C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe'
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static file information: File size 1308160 > 1048576
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x10ea00
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FD04D8 pushfd ; ret 8_2_00FD08AD
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FDC699 push 8B50001Dh; iretd 8_2_00FDC6A6
Source: initial sample Static PE information: section name: .text entropy: 7.72058694017
Source: initial sample Static PE information: section name: .text entropy: 7.72058694017

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File created: C:\Users\user\AppData\Roaming\EsckCcRbv.exe Jump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedules
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Window / User API: threadDelayed 1776 Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Window / User API: threadDelayed 8064 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 3556 Thread sleep time: -41199s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 4992 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 2196 Thread sleep time: -25825441703193356s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 1012 Thread sleep count: 1776 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 1012 Thread sleep count: 8064 > 30 Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Thread delayed: delay time: 41199 Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmp Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmp Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmp Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmp Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Code function: 8_2_00FD3268 LdrInitializeThunk, 8_2_00FD3268
Enables debug privileges
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Memory written: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe base: 400000 value starts with: 4D5A Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Process created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Jump to behavior
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmp Binary or memory string: Progman
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected AgentTesla
Source: Yara match File source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Yara detected AgentTesla
Source: Yara match File source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112, type: MEMORYSTR
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Tries to harvest and steal ftp login credentials
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\ Jump to behavior
Tries to steal Mail credentials (via file access)
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Yara detected Credential Stealer
Source: Yara match File source: 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112, type: MEMORYSTR

Remote Access Functionality:

barindex
Yara detected AgentTesla
Source: Yara match File source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Yara detected AgentTesla
Source: Yara match File source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs