Loading ...

Play interactive tourEdit tour

Windows Analysis Report Ziraat Bankas#U0131 Swift Mesaj#U0131.exe

Overview

General Information

Sample Name:Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
Analysis ID:458932
MD5:680f6c1fb95c2a1e1fff056a7b40eaa6
SHA1:d56bb135538fd65ef001ffe56aff478305f924ad
SHA256:5a0c8ee77f3b3a456846d43f1de0de06123c6e5bd545ee1c4130c846d67ef328
Tags:exenull
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Ziraat Bankas#U0131 Swift Mesaj#U0131.exe (PID: 2376 cmdline: 'C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe' MD5: 680F6C1FB95C2A1E1FFF056A7B40EAA6)
    • schtasks.exe (PID: 5624 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "info@floragumruk.com.tr", "Password": "A48vLCL194bD", "Host": "mail.floragumruk.com.tr"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info@floragumruk.com.tr", "Password": "A48vLCL194bD", "Host": "mail.floragumruk.com.tr"}
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\EsckCcRbv.exeMetadefender: Detection: 48%Perma Link
                Source: C:\Users\user\AppData\Roaming\EsckCcRbv.exeReversingLabs: Detection: 82%
                Multi AV Scanner detection for submitted fileShow sources
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeVirustotal: Detection: 64%Perma Link
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeMetadefender: Detection: 48%Perma Link
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeReversingLabs: Detection: 82%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\EsckCcRbv.exeJoe Sandbox ML: detected
                Machine Learning detection for sampleShow sources
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeJoe Sandbox ML: detected
                Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49728 -> 37.230.104.41:587
                Source: global trafficTCP traffic: 192.168.2.5:49728 -> 37.230.104.41:587
                Source: Joe Sandbox ViewASN Name: AEROTEK-ASTR AEROTEK-ASTR
                Source: global trafficTCP traffic: 192.168.2.5:49728 -> 37.230.104.41:587
                Source: unknownDNS traffic detected: queries for: mail.floragumruk.com.tr
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpString found in binary or memory: http://cLLRlW.com
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmpString found in binary or memory: http://floragumruk.com.tr
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmpString found in binary or memory: http://mail.floragumruk.com.tr
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmp, Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpString found in binary or memory: https://V0OB6VWwZnBYDjMQY.com
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Installs a global keyboard hookShow sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bADD87429u002dC3E7u002d4A62u002d8EF3u002d75577D8941FFu007d/A3A30B0Au002dE6F8u002d41C3u002dA5B5u002d2EECAE7566D2.csLarge array initialization: .cctor: array initializer size 11942
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FD32688_2_00FD3268
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FD7BC08_2_00FD7BC0
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FDC7988_2_00FDC798
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FD8B878_2_00FD8B87
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FD64908_2_00FD6490
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_010CE2528_2_010CE252
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_010CDAE88_2_010CDAE8
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: EsckCcRbv.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000001.00000000.218129864.0000000001032000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEncoderFallbackBuff.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.487225265.00000000008D2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEncoderFallbackBuff.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.487483640.0000000000CF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.490184039.0000000001220000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameAKtSoDcCZtIweTlXzHwVfUdzYJWIylpU.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.488203851.0000000000E00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeBinary or memory string: OriginalFilenameEncoderFallbackBuff.exe4 vs Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: EsckCcRbv.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@2/1
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile created: C:\Users\user\AppData\Roaming\EsckCcRbv.exeJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5336:120:WilError_01
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeMutant created: \Sessions\1\BaseNamedObjects\wjgvxdnXLAgNsj
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC068.tmpJump to behavior
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeVirustotal: Detection: 64%
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeMetadefender: Detection: 48%
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeReversingLabs: Detection: 82%
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile read: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe 'C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe'
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic file information: File size 1308160 > 1048576
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10ea00
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FD04D8 pushfd ; ret 8_2_00FD08AD
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FDC699 push 8B50001Dh; iretd 8_2_00FDC6A6
                Source: initial sampleStatic PE information: section name: .text entropy: 7.72058694017
                Source: initial sampleStatic PE information: section name: .text entropy: 7.72058694017
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile created: C:\Users\user\AppData\Roaming\EsckCcRbv.exeJump to dropped file

                Boot Survival:

                barindex
                Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWindow / User API: threadDelayed 1776Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWindow / User API: threadDelayed 8064Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 3556Thread sleep time: -41199s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 4992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 2196Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 1012Thread sleep count: 1776 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe TID: 1012Thread sleep count: 8064 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeThread delayed: delay time: 41199Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.495240954.0000000005CE0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeCode function: 8_2_00FD3268 LdrInitializeThunk,8_2_00FD3268
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeMemory written: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'Jump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeProcess created: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeJump to behavior
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                Source: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.491276327.00000000016B0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112, type: MEMORYSTR
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe PID: 5112, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Input Capture11System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery211Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Ziraat Bankas#U0131 Swift Mesaj#U0131.exe64%VirustotalBrowse
                Ziraat Bankas#U0131 Swift Mesaj#U0131.exe57%MetadefenderBrowse
                Ziraat Bankas#U0131 Swift Mesaj#U0131.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                Ziraat Bankas#U0131 Swift Mesaj#U0131.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\EsckCcRbv.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\EsckCcRbv.exe57%MetadefenderBrowse
                C:\Users\user\AppData\Roaming\EsckCcRbv.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                8.2.Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://floragumruk.com.tr0%Avira URL Cloudsafe
                http://mail.floragumruk.com.tr0%Avira URL Cloudsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://V0OB6VWwZnBYDjMQY.com0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://cLLRlW.com0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                floragumruk.com.tr
                37.230.104.41
                truetrue
                  unknown
                  mail.floragumruk.com.tr
                  unknown
                  unknowntrue
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://floragumruk.com.trZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://mail.floragumruk.com.trZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://127.0.0.1:HTTP/1.1Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://V0OB6VWwZnBYDjMQY.comZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.493507657.0000000003059000.00000004.00000001.sdmp, Ziraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://cLLRlW.comZiraat Bankas#U0131 Swift Mesaj#U0131.exe, 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    37.230.104.41
                    floragumruk.com.trTurkey
                    42807AEROTEK-ASTRtrue

                    General Information

                    Joe Sandbox Version:33.0.0 White Diamond
                    Analysis ID:458932
                    Start date:03.08.2021
                    Start time:22:05:17
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 10s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:26
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/4@2/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 8
                    • Number of non-executed functions: 3
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .exe
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 13.64.90.137, 204.79.197.200, 13.107.21.200, 23.211.6.115, 52.147.198.201, 104.42.151.234, 23.35.236.56, 20.50.102.62, 40.112.88.60, 8.248.115.254, 8.253.95.249, 67.26.75.254, 67.26.139.254, 8.253.207.120, 20.49.157.6, 80.67.82.211, 80.67.82.235, 20.82.210.154
                    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolwus16.cloudapp.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    22:06:20API Interceptor675x Sleep call for process: Ziraat Bankas#U0131 Swift Mesaj#U0131.exe modified

                    Joe Sandbox View / Context

                    IPs

                    No context

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    AEROTEK-ASTRProject 4302021KSA.exeGet hashmaliciousBrowse
                    • 94.199.200.120
                    1ZGjHt2KH0.exeGet hashmaliciousBrowse
                    • 109.232.219.146
                    Inv 820984.xlsbGet hashmaliciousBrowse
                    • 109.232.216.14
                    dqVPlpmWYt.exeGet hashmaliciousBrowse
                    • 109.232.216.119
                    REQUEST_QUOTATION.exeGet hashmaliciousBrowse
                    • 109.232.216.160
                    HlSU4wxbukkT8gY.exeGet hashmaliciousBrowse
                    • 37.230.104.123
                    generated check 8460.xlsmGet hashmaliciousBrowse
                    • 178.157.15.48
                    invoice 85046.xlsmGet hashmaliciousBrowse
                    • 178.157.15.48
                    scan of fax 096859.xlsmGet hashmaliciousBrowse
                    • 178.157.15.48
                    copy of order 9119.xlsmGet hashmaliciousBrowse
                    • 178.157.15.48
                    export of invoice 33562.xlsmGet hashmaliciousBrowse
                    • 213.159.7.252
                    generated document 0041.xlsmGet hashmaliciousBrowse
                    • 178.157.15.48
                    PO-20210510-01-09 SANAM IND.exeGet hashmaliciousBrowse
                    • 37.230.106.4
                    xpy9BhQR3t.xlsxGet hashmaliciousBrowse
                    • 109.232.217.72
                    20210324000190100100.pdf.exeGet hashmaliciousBrowse
                    • 109.232.220.251
                    COAU7229898130.xlsxGet hashmaliciousBrowse
                    • 109.232.217.72
                    doc20210318009090100191001.xls.exeGet hashmaliciousBrowse
                    • 109.232.220.251
                    fCYy6hQKDcZaVZZ.exeGet hashmaliciousBrowse
                    • 94.199.200.42
                    9V3LjvhSMb.exeGet hashmaliciousBrowse
                    • 109.232.217.72
                    O18SQHQPFU.xlsGet hashmaliciousBrowse
                    • 109.232.216.57

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe.log
                    Process:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):1216
                    Entropy (8bit):5.355304211458859
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                    C:\Users\user\AppData\Local\Temp\tmpC068.tmp
                    Process:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1646
                    Entropy (8bit):5.168296812555386
                    Encrypted:false
                    SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB33tn:cbhC7ZlNQF/rydbz9I3YODOLNdq3Zd
                    MD5:D990F199FFB479A0432FF763439F7D09
                    SHA1:970321FF50075DBC25662CB3AE75469D292B97F3
                    SHA-256:3F5F2C1157715CFCED69478621B2321D8100B9B5452821FB31D637A29A0CE0A9
                    SHA-512:C6DF534463D1BE0D4F359885106218E38C05E76EFFC34F67A01DB13ACB334A82996CEAB5F1EADB461AC3861639BC5FA2582E8337EF680253CAD7786C205C4E7F
                    Malicious:true
                    Reputation:low
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                    C:\Users\user\AppData\Roaming\EsckCcRbv.exe
                    Process:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):1308160
                    Entropy (8bit):7.565805002571174
                    Encrypted:false
                    SSDEEP:24576:3GS/d3QKzksAks2y8j+JxVqUW6i4hgDTNit2wsDe6VUbbi8N6ZNyZ:yKhuJaUW6bATNit2wsDe3b3N6ZNy
                    MD5:680F6C1FB95C2A1E1FFF056A7B40EAA6
                    SHA1:D56BB135538FD65EF001FFE56AFF478305F924AD
                    SHA-256:5A0C8EE77F3B3A456846D43F1DE0DE06123C6E5BD545EE1C4130C846D67EF328
                    SHA-512:8FD3665B4D716EC1163472E37FC0672F0EEBAF133DC752E2AD82DFD9C5D86A3E0818912A40A4961CF324AD34B2641AE4E9EFC4217B1121D299A333F059676C07
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Metadefender, Detection: 57%, Browse
                    • Antivirus: ReversingLabs, Detection: 82%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....D.a..............P.................. ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........XI..........@...H.............................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r)..p~....o-...(......t$....+..*...0..&........(....r?..p~....o-...(......
                    C:\Users\user\AppData\Roaming\EsckCcRbv.exe:Zone.Identifier
                    Process:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: [ZoneTransfer]....ZoneId=0

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.565805002571174
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    File size:1308160
                    MD5:680f6c1fb95c2a1e1fff056a7b40eaa6
                    SHA1:d56bb135538fd65ef001ffe56aff478305f924ad
                    SHA256:5a0c8ee77f3b3a456846d43f1de0de06123c6e5bd545ee1c4130c846d67ef328
                    SHA512:8fd3665b4d716ec1163472e37fc0672f0eebaf133dc752e2ad82dfd9c5d86a3e0818912a40a4961cf324ad34b2641ae4e9efc4217b1121d299a333f059676c07
                    SSDEEP:24576:3GS/d3QKzksAks2y8j+JxVqUW6i4hgDTNit2wsDe6VUbbi8N6ZNyZ:yKhuJaUW6bATNit2wsDe3b3N6ZNy
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....D.a..............P.................. ... ....@.. .......................`............@................................

                    File Icon

                    Icon Hash:d8b4e6c6d8d8f2dc

                    Static PE Info

                    General

                    Entrypoint:0x5109da
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x610244F8 [Thu Jul 29 06:04:40 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1109880x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1120000x30790.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1440000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x10e9e00x10ea00False0.86796153291data7.72058694017IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0x1120000x307900x30800False0.404885832796data5.84446881612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x1440000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x1122000x8757PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                    RT_ICON0x11a9680x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                    RT_ICON0x12b1a00x94a8data
                    RT_ICON0x1346580x5488data
                    RT_ICON0x139af00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 33023, next used block 4278255616
                    RT_ICON0x13dd280x25a8data
                    RT_ICON0x1402e00x10a8data
                    RT_ICON0x1413980x988data
                    RT_ICON0x141d300x468GLS_BINARY_LSB_FIRST
                    RT_GROUP_ICON0x1421a80x84data
                    RT_VERSION0x14223c0x354data
                    RT_MANIFEST0x1425a00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightProfitpros (C)
                    Assembly Version2.0.5.0
                    InternalNameEncoderFallbackBuff.exe
                    FileVersion2.0.5.0
                    CompanyNameProfitpros
                    LegalTrademarks
                    Comments
                    ProductNameform1dan2
                    ProductVersion2.0.5.0
                    FileDescriptionform1dan2
                    OriginalFilenameEncoderFallbackBuff.exe

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    08/03/21-22:08:05.031334TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49728587192.168.2.537.230.104.41

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2021 22:08:04.524728060 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.572844028 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.573050022 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.714658976 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.715243101 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.763319016 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.771037102 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.819416046 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.820103884 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.873063087 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.876874924 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.924724102 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.925641060 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:04.980920076 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:04.981370926 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:05.029164076 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:05.029443979 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:05.031333923 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:05.031606913 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:05.037713051 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:05.037836075 CEST49728587192.168.2.537.230.104.41
                    Aug 3, 2021 22:08:05.079175949 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:05.085490942 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:05.089575052 CEST5874972837.230.104.41192.168.2.5
                    Aug 3, 2021 22:08:05.134242058 CEST49728587192.168.2.537.230.104.41

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2021 22:05:57.578552008 CEST6206053192.168.2.58.8.8.8
                    Aug 3, 2021 22:05:57.606065989 CEST53620608.8.8.8192.168.2.5
                    Aug 3, 2021 22:05:57.893893003 CEST6180553192.168.2.58.8.8.8
                    Aug 3, 2021 22:05:57.926989079 CEST53618058.8.8.8192.168.2.5
                    Aug 3, 2021 22:05:58.617264032 CEST5479553192.168.2.58.8.8.8
                    Aug 3, 2021 22:05:58.649790049 CEST53547958.8.8.8192.168.2.5
                    Aug 3, 2021 22:05:58.820511103 CEST4955753192.168.2.58.8.8.8
                    Aug 3, 2021 22:05:58.858997107 CEST53495578.8.8.8192.168.2.5
                    Aug 3, 2021 22:05:59.641647100 CEST6173353192.168.2.58.8.8.8
                    Aug 3, 2021 22:05:59.670607090 CEST53617338.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:00.508181095 CEST6544753192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:00.536041021 CEST53654478.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:01.684025049 CEST5244153192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:01.709908962 CEST53524418.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:02.600500107 CEST6217653192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:02.633536100 CEST53621768.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:03.252257109 CEST5959653192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:03.286463976 CEST53595968.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:06.566083908 CEST6529653192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:06.599786043 CEST53652968.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:07.664993048 CEST6318353192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:07.700248003 CEST53631838.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:08.678020954 CEST6015153192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:08.713516951 CEST53601518.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:25.736864090 CEST5696953192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:25.771187067 CEST53569698.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:30.528033972 CEST5516153192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:30.560420036 CEST53551618.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:48.251754045 CEST5475753192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:48.284504890 CEST53547578.8.8.8192.168.2.5
                    Aug 3, 2021 22:06:52.010488033 CEST4999253192.168.2.58.8.8.8
                    Aug 3, 2021 22:06:52.038408041 CEST53499928.8.8.8192.168.2.5
                    Aug 3, 2021 22:07:04.408411026 CEST6007553192.168.2.58.8.8.8
                    Aug 3, 2021 22:07:04.455576897 CEST53600758.8.8.8192.168.2.5
                    Aug 3, 2021 22:07:07.196957111 CEST5501653192.168.2.58.8.8.8
                    Aug 3, 2021 22:07:07.231184959 CEST53550168.8.8.8192.168.2.5
                    Aug 3, 2021 22:07:39.099981070 CEST6434553192.168.2.58.8.8.8
                    Aug 3, 2021 22:07:39.132549047 CEST53643458.8.8.8192.168.2.5
                    Aug 3, 2021 22:07:40.752145052 CEST5712853192.168.2.58.8.8.8
                    Aug 3, 2021 22:07:40.787810087 CEST53571288.8.8.8192.168.2.5
                    Aug 3, 2021 22:08:04.032545090 CEST5479153192.168.2.58.8.8.8
                    Aug 3, 2021 22:08:04.219329119 CEST53547918.8.8.8192.168.2.5
                    Aug 3, 2021 22:08:04.232567072 CEST5046353192.168.2.58.8.8.8
                    Aug 3, 2021 22:08:04.415386915 CEST53504638.8.8.8192.168.2.5

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Aug 3, 2021 22:08:04.032545090 CEST192.168.2.58.8.8.80x8428Standard query (0)mail.floragumruk.com.trA (IP address)IN (0x0001)
                    Aug 3, 2021 22:08:04.232567072 CEST192.168.2.58.8.8.80xccb7Standard query (0)mail.floragumruk.com.trA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 3, 2021 22:08:04.219329119 CEST8.8.8.8192.168.2.50x8428No error (0)mail.floragumruk.com.trfloragumruk.com.trCNAME (Canonical name)IN (0x0001)
                    Aug 3, 2021 22:08:04.219329119 CEST8.8.8.8192.168.2.50x8428No error (0)floragumruk.com.tr37.230.104.41A (IP address)IN (0x0001)
                    Aug 3, 2021 22:08:04.415386915 CEST8.8.8.8192.168.2.50xccb7No error (0)mail.floragumruk.com.trfloragumruk.com.trCNAME (Canonical name)IN (0x0001)
                    Aug 3, 2021 22:08:04.415386915 CEST8.8.8.8192.168.2.50xccb7No error (0)floragumruk.com.tr37.230.104.41A (IP address)IN (0x0001)

                    SMTP Packets

                    TimestampSource PortDest PortSource IPDest IPCommands
                    Aug 3, 2021 22:08:04.714658976 CEST5874972837.230.104.41192.168.2.5220-srv.epromnet.com ESMTP Exim 4.94.2 #2 Tue, 03 Aug 2021 23:08:06 +0300
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Aug 3, 2021 22:08:04.715243101 CEST49728587192.168.2.537.230.104.41EHLO 960781
                    Aug 3, 2021 22:08:04.763319016 CEST5874972837.230.104.41192.168.2.5250-srv.epromnet.com Hello 960781 [84.17.52.25]
                    250-SIZE 52428800
                    250-8BITMIME
                    250-PIPELINING
                    250-PIPE_CONNECT
                    250-AUTH PLAIN LOGIN
                    250-STARTTLS
                    250 HELP
                    Aug 3, 2021 22:08:04.771037102 CEST49728587192.168.2.537.230.104.41AUTH login aW5mb0BmbG9yYWd1bXJ1ay5jb20udHI=
                    Aug 3, 2021 22:08:04.819416046 CEST5874972837.230.104.41192.168.2.5334 UGFzc3dvcmQ6
                    Aug 3, 2021 22:08:04.873063087 CEST5874972837.230.104.41192.168.2.5235 Authentication succeeded
                    Aug 3, 2021 22:08:04.876874924 CEST49728587192.168.2.537.230.104.41MAIL FROM:<info@floragumruk.com.tr>
                    Aug 3, 2021 22:08:04.924724102 CEST5874972837.230.104.41192.168.2.5250 OK
                    Aug 3, 2021 22:08:04.925641060 CEST49728587192.168.2.537.230.104.41RCPT TO:<info@floragumruk.com.tr>
                    Aug 3, 2021 22:08:04.980920076 CEST5874972837.230.104.41192.168.2.5250 Accepted
                    Aug 3, 2021 22:08:04.981370926 CEST49728587192.168.2.537.230.104.41DATA
                    Aug 3, 2021 22:08:05.029443979 CEST5874972837.230.104.41192.168.2.5354 Enter message, ending with "." on a line by itself
                    Aug 3, 2021 22:08:05.037836075 CEST49728587192.168.2.537.230.104.41.
                    Aug 3, 2021 22:08:05.089575052 CEST5874972837.230.104.41192.168.2.5250 OK id=1mB0hv-003Lkm-O8

                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:22:06:03
                    Start date:03/08/2021
                    Path:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe'
                    Imagebase:0xf20000
                    File size:1308160 bytes
                    MD5 hash:680F6C1FB95C2A1E1FFF056A7B40EAA6
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:low

                    General

                    Start time:22:06:24
                    Start date:03/08/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\EsckCcRbv' /XML 'C:\Users\user\AppData\Local\Temp\tmpC068.tmp'
                    Imagebase:0x100000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:22:06:25
                    Start date:03/08/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7ecfc0000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:22:06:25
                    Start date:03/08/2021
                    Path:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\Ziraat Bankas#U0131 Swift Mesaj#U0131.exe
                    Imagebase:0x7ff797770000
                    File size:1308160 bytes
                    MD5 hash:680F6C1FB95C2A1E1FFF056A7B40EAA6
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.486114668.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.492269124.0000000002D01000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >

                      Executed Functions

                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: <($\$\$\$\
                      • API String ID: 0-3754264078
                      • Opcode ID: 56e92a540868be0c0bde9dee7b8b7d3cc053eba459a1d4bd768ffca8d4ec363f
                      • Instruction ID: 05d3160a262ec20d5b3e7f2ee5471d360fd405537ae9e9ff3318830f8370aa8e
                      • Opcode Fuzzy Hash: 56e92a540868be0c0bde9dee7b8b7d3cc053eba459a1d4bd768ffca8d4ec363f
                      • Instruction Fuzzy Hash: 16924E31E006198FCB24EF78C95479DB7F2AF89304F1485AAD549AB354EF30AD858F51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7125865d87df2bda620ad5148eebf3bc57c2ead7df8121a9e0de6247ebdce71
                      • Instruction ID: c2c42b09650436d8b81ec26aaf01f96c0566370e554f689301583f21be881d56
                      • Opcode Fuzzy Hash: a7125865d87df2bda620ad5148eebf3bc57c2ead7df8121a9e0de6247ebdce71
                      • Instruction Fuzzy Hash: 7B53B031D146598FCB11DB78C854AE9B7F2EF95310F19C6EBE048AB211EB309AC5DB81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e73b74772da81cce6939ae7e6d093cba256572e25128c7506b9f2dec9da53680
                      • Instruction ID: 73dec43779463c63debeecbc1319184c7654ee0cbfabb1d3fa5f5e13a01953c7
                      • Opcode Fuzzy Hash: e73b74772da81cce6939ae7e6d093cba256572e25128c7506b9f2dec9da53680
                      • Instruction Fuzzy Hash: F663FB31D14B198ECB11EF68C884A99B7B2FF95310F15C79AE4587B221EB70AAC5CF41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5965dcabb31acbd75ac2db88dc743ace52d72998ac816df5d589ce85fa9673ee
                      • Instruction ID: b2bcd557e431e85698fbeb7bb97312a380f5ff6f6f7760a06da6cd5933233da5
                      • Opcode Fuzzy Hash: 5965dcabb31acbd75ac2db88dc743ace52d72998ac816df5d589ce85fa9673ee
                      • Instruction Fuzzy Hash: 76335F70D106598FCB14EF68C850AADF7F2BF99300F15C6AAE449AB255EB30A9C5CF41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 6bcca75ce5a2d58defe92e91930d6b9239a19d27265e3fdd049ef93dc681ecca
                      • Instruction ID: a528235b7068253607a0abd9f07ae2fddb6d30fe1b6acc56be8fa054a5aed2da
                      • Opcode Fuzzy Hash: 6bcca75ce5a2d58defe92e91930d6b9239a19d27265e3fdd049ef93dc681ecca
                      • Instruction Fuzzy Hash: F451D631A042459FCB05EBB4D845AEE7BB6EF45314F18846AE542EB356EF34E809CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: cad2876a69cde318defd3e8c8a0e1ede0c31b1c05d1fe0ecf81f73a895a40c22
                      • Instruction ID: 31dbfae8b42c1c30ae84075c580cee638d01d282314556b1a686c18bb524650b
                      • Opcode Fuzzy Hash: cad2876a69cde318defd3e8c8a0e1ede0c31b1c05d1fe0ecf81f73a895a40c22
                      • Instruction Fuzzy Hash: B8519131A002059FCB14EFB4D995AAEB7B6BF84314F148569E542EB385EF70E9448BA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489573622.00000000010CD000.00000040.00000001.sdmp, Offset: 010CD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ce0203aeb602625e8d11f439bbbf0460bf9db750b26f96f0db55b07a02ca885
                      • Instruction ID: 8d8f5b334913c9476c5a770d386ef079fc33a5f8cbcfeb297442821601f45f3e
                      • Opcode Fuzzy Hash: 3ce0203aeb602625e8d11f439bbbf0460bf9db750b26f96f0db55b07a02ca885
                      • Instruction Fuzzy Hash: ED21F171504244AFCB11DF98D4C0B2EBBA1EB84654F30C5BDE9894B246C336D807CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489573622.00000000010CD000.00000040.00000001.sdmp, Offset: 010CD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4c0c88ae462411291c956913b7518d356f0177c0379bdea873ee3bc1d86ff9d1
                      • Instruction ID: d6b6b012c35c9e2bda95a5ad2cc5450934a547092b88ad7a2a5ed4f3b6464a44
                      • Opcode Fuzzy Hash: 4c0c88ae462411291c956913b7518d356f0177c0379bdea873ee3bc1d86ff9d1
                      • Instruction Fuzzy Hash: EA2192755083809FCB03CF58D994B15BFB1EB46314F28C5EAD8858F257C33A984ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Memory Dump Source
                      • Source File: 00000008.00000002.489573622.00000000010CD000.00000040.00000001.sdmp, Offset: 010CD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: afc260a51bec51efa2d5e8a8a26768e373f9710ccb8c78c8a42d497577a2e950
                      • Instruction ID: 06b5ab915e4ab755464e58e22756032df526dc3824a210f998fb2acb8c988adc
                      • Opcode Fuzzy Hash: afc260a51bec51efa2d5e8a8a26768e373f9710ccb8c78c8a42d497577a2e950
                      • Instruction Fuzzy Hash: 6622933146E3C19FE3438B78D8616563FF1AF07629F1A04DBC480CF1A7D26A595ACB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489169603.0000000000FD0000.00000040.00000001.sdmp, Offset: 00FD0000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c77eeb5cccfa3c837f91ad0626431746264ad716101d53ed6b07da37527dc65
                      • Instruction ID: da1567bf56bd3b0cafad5d2657f7f4c4372a8b6fea93a6e7f9390f2ea858ad64
                      • Opcode Fuzzy Hash: 7c77eeb5cccfa3c837f91ad0626431746264ad716101d53ed6b07da37527dc65
                      • Instruction Fuzzy Hash: 4F024830A002598FCB24EFB8C8547AEB7B6BF98308F15846AE449EB355DF359D85CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000008.00000002.489573622.00000000010CD000.00000040.00000001.sdmp, Offset: 010CD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b937c87c7bf693cd999efdb1a86eac9037528f1f8bbb6db73e80cf466b929231
                      • Instruction ID: 0973905749dca64f745b0e4714a641c7dc3207cf657c09fa298b1ffd4de13352
                      • Opcode Fuzzy Hash: b937c87c7bf693cd999efdb1a86eac9037528f1f8bbb6db73e80cf466b929231
                      • Instruction Fuzzy Hash: DF912C7115A7C1DFE7438B38C8917563FB0AF07628F1A44DBC481CF1A3D26A985ACB62
                      Uniqueness

                      Uniqueness Score: -1.00%