Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 23:18
Behavioral task
behavioral1
Sample
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe
Resource
win10v2004-20220901-en
General
-
Target
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe
-
Size
238KB
-
MD5
da0d379af51fd10a8ca99b7ff84b2779
-
SHA1
97ba43eba04bda9ff3067f12f282bae22afbc62d
-
SHA256
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7
-
SHA512
d3ef568950f5f201b134ac7de139ae053233aac76788fa8ea6fd83317d55100c473647774ee482f6525785420deb4b880ba1d747590d3905486cdc3d786e4235
-
SSDEEP
6144:5oSk2d/iP1FMxld3qac3TMfKC3XSTKGXylljag8dj:5oSk2d/iYld323TKFGX+BaHdj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
rekuy.exerekuy.exepid Process 1192 rekuy.exe 4312 rekuy.exe -
Processes:
resource yara_rule behavioral2/memory/4640-132-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4640-136-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0001000000022dea-139.dat upx behavioral2/files/0x0001000000022dea-140.dat upx behavioral2/files/0x0001000000022dea-143.dat upx behavioral2/memory/1192-144-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
rekuy.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\Currentversion\Run rekuy.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\Currentversion\Run rekuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ipgut = "C:\\Users\\Admin\\AppData\\Roaming\\Etunuk\\rekuy.exe" rekuy.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exerekuy.exedescription pid Process procid_target PID 4640 set thread context of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 1192 set thread context of 4312 1192 rekuy.exe 82 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rekuy.exepid Process 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe 4312 rekuy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exedescription pid Process Token: SeSecurityPrivilege 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe Token: SeSecurityPrivilege 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exeab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exerekuy.exerekuy.exedescription pid Process procid_target PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 4640 wrote to memory of 2060 4640 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 80 PID 2060 wrote to memory of 1192 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 81 PID 2060 wrote to memory of 1192 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 81 PID 2060 wrote to memory of 1192 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 81 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 1192 wrote to memory of 4312 1192 rekuy.exe 82 PID 2060 wrote to memory of 816 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 83 PID 2060 wrote to memory of 816 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 83 PID 2060 wrote to memory of 816 2060 ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe 83 PID 4312 wrote to memory of 2292 4312 rekuy.exe 59 PID 4312 wrote to memory of 2292 4312 rekuy.exe 59 PID 4312 wrote to memory of 2292 4312 rekuy.exe 59 PID 4312 wrote to memory of 2292 4312 rekuy.exe 59 PID 4312 wrote to memory of 2292 4312 rekuy.exe 59 PID 4312 wrote to memory of 2320 4312 rekuy.exe 58 PID 4312 wrote to memory of 2320 4312 rekuy.exe 58 PID 4312 wrote to memory of 2320 4312 rekuy.exe 58 PID 4312 wrote to memory of 2320 4312 rekuy.exe 58 PID 4312 wrote to memory of 2320 4312 rekuy.exe 58 PID 4312 wrote to memory of 2400 4312 rekuy.exe 57 PID 4312 wrote to memory of 2400 4312 rekuy.exe 57 PID 4312 wrote to memory of 2400 4312 rekuy.exe 57 PID 4312 wrote to memory of 2400 4312 rekuy.exe 57 PID 4312 wrote to memory of 2400 4312 rekuy.exe 57 PID 4312 wrote to memory of 3064 4312 rekuy.exe 48 PID 4312 wrote to memory of 3064 4312 rekuy.exe 48 PID 4312 wrote to memory of 3064 4312 rekuy.exe 48 PID 4312 wrote to memory of 3064 4312 rekuy.exe 48 PID 4312 wrote to memory of 3064 4312 rekuy.exe 48 PID 4312 wrote to memory of 1328 4312 rekuy.exe 47 PID 4312 wrote to memory of 1328 4312 rekuy.exe 47 PID 4312 wrote to memory of 1328 4312 rekuy.exe 47 PID 4312 wrote to memory of 1328 4312 rekuy.exe 47 PID 4312 wrote to memory of 1328 4312 rekuy.exe 47 PID 4312 wrote to memory of 3216 4312 rekuy.exe 46 PID 4312 wrote to memory of 3216 4312 rekuy.exe 46 PID 4312 wrote to memory of 3216 4312 rekuy.exe 46 PID 4312 wrote to memory of 3216 4312 rekuy.exe 46 PID 4312 wrote to memory of 3216 4312 rekuy.exe 46 PID 4312 wrote to memory of 3316 4312 rekuy.exe 45 PID 4312 wrote to memory of 3316 4312 rekuy.exe 45 PID 4312 wrote to memory of 3316 4312 rekuy.exe 45 PID 4312 wrote to memory of 3316 4312 rekuy.exe 45 PID 4312 wrote to memory of 3316 4312 rekuy.exe 45 PID 4312 wrote to memory of 3380 4312 rekuy.exe 44 PID 4312 wrote to memory of 3380 4312 rekuy.exe 44 PID 4312 wrote to memory of 3380 4312 rekuy.exe 44 PID 4312 wrote to memory of 3380 4312 rekuy.exe 44 PID 4312 wrote to memory of 3380 4312 rekuy.exe 44 PID 4312 wrote to memory of 3520 4312 rekuy.exe 43 PID 4312 wrote to memory of 3520 4312 rekuy.exe 43
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3820
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3520
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3380
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3316
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"C:\Users\Admin\AppData\Local\Temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\users\admin\appdata\local\temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"c:\users\admin\appdata\local\temp\ab630db6cf89867cc8037af5da08fa39259e671ef65fb4ecae35c015a633dbf7.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Roaming\Etunuk\rekuy.exe"C:\Users\Admin\AppData\Roaming\Etunuk\rekuy.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\users\admin\appdata\roaming\etunuk\rekuy.exe"c:\users\admin\appdata\roaming\etunuk\rekuy.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp58d360be.bat"4⤵PID:816
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3636
-
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2320
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e51647ac580ca5e33690825abf50bc05
SHA13a5e4de7e512acc8c68ac0a824ffd48690fe026d
SHA2566a13721b2236ff619729bf07afd478cfa8606e10b2ba8ba0891dd83a3429260c
SHA51224c7c14cc4ab6e9e4d56078465385d880908596b8259363db9cdd8e79e0cc824f698b598974200f31e3dae31484d4733b641050791ced0849c7c53e6edb79b3e
-
Filesize
238KB
MD5bb3878f7b115083fb2d4ca02d34c5738
SHA15e1f9cad032f718a18d84ece24e8f9761ef916a3
SHA256212119e62bbffc2ce9e12d2b7b8266bae30fb89c926c5eb540d49b0da3b0118f
SHA51271e4da94d5071706578c9d7d5c8ef54807251dbc28d768847cd03dec530c33892124c01f09772008669b9c55cb360bbdff69c0fa319e08bdfe2037defdddaf9e
-
Filesize
238KB
MD5bb3878f7b115083fb2d4ca02d34c5738
SHA15e1f9cad032f718a18d84ece24e8f9761ef916a3
SHA256212119e62bbffc2ce9e12d2b7b8266bae30fb89c926c5eb540d49b0da3b0118f
SHA51271e4da94d5071706578c9d7d5c8ef54807251dbc28d768847cd03dec530c33892124c01f09772008669b9c55cb360bbdff69c0fa319e08bdfe2037defdddaf9e
-
Filesize
238KB
MD5bb3878f7b115083fb2d4ca02d34c5738
SHA15e1f9cad032f718a18d84ece24e8f9761ef916a3
SHA256212119e62bbffc2ce9e12d2b7b8266bae30fb89c926c5eb540d49b0da3b0118f
SHA51271e4da94d5071706578c9d7d5c8ef54807251dbc28d768847cd03dec530c33892124c01f09772008669b9c55cb360bbdff69c0fa319e08bdfe2037defdddaf9e