Analysis
-
max time kernel
150s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe
Resource
win10v2004-20220812-en
General
-
Target
7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe
-
Size
305KB
-
MD5
a2cf56861a19fb60b552af6b9c86caeb
-
SHA1
e850f440b54f951c55d3b39c102857b258b3cf26
-
SHA256
7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b
-
SHA512
7c6f1951bdd4aa0ac6da5b8d5ed8d6df029ed4845cce9ab4c1485fd93390527e68860ddec58feac43f9085bb8bb9ea539085610b399e15fc79aa49605c5f7858
-
SSDEEP
6144:EZVQK+tyRnJdaKZfZMSm/JZJVag4y4aRC2/IC0zzisaMJ:EZVt+4RnTZaS0J/4vXa4zqMJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 fekyon.exe -
Deletes itself 1 IoCs
pid Process 1160 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Puitu\\fekyon.exe" fekyon.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run fekyon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe 2028 fekyon.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 2028 fekyon.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2028 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 27 PID 1632 wrote to memory of 2028 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 27 PID 1632 wrote to memory of 2028 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 27 PID 1632 wrote to memory of 2028 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 27 PID 2028 wrote to memory of 1116 2028 fekyon.exe 9 PID 2028 wrote to memory of 1116 2028 fekyon.exe 9 PID 2028 wrote to memory of 1116 2028 fekyon.exe 9 PID 2028 wrote to memory of 1116 2028 fekyon.exe 9 PID 2028 wrote to memory of 1116 2028 fekyon.exe 9 PID 2028 wrote to memory of 1180 2028 fekyon.exe 8 PID 2028 wrote to memory of 1180 2028 fekyon.exe 8 PID 2028 wrote to memory of 1180 2028 fekyon.exe 8 PID 2028 wrote to memory of 1180 2028 fekyon.exe 8 PID 2028 wrote to memory of 1180 2028 fekyon.exe 8 PID 2028 wrote to memory of 1268 2028 fekyon.exe 7 PID 2028 wrote to memory of 1268 2028 fekyon.exe 7 PID 2028 wrote to memory of 1268 2028 fekyon.exe 7 PID 2028 wrote to memory of 1268 2028 fekyon.exe 7 PID 2028 wrote to memory of 1268 2028 fekyon.exe 7 PID 2028 wrote to memory of 1632 2028 fekyon.exe 4 PID 2028 wrote to memory of 1632 2028 fekyon.exe 4 PID 2028 wrote to memory of 1632 2028 fekyon.exe 4 PID 2028 wrote to memory of 1632 2028 fekyon.exe 4 PID 2028 wrote to memory of 1632 2028 fekyon.exe 4 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28 PID 1632 wrote to memory of 1160 1632 7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe"C:\Users\Admin\AppData\Local\Temp\7d8755ce809ad5ac79fcd9ced8eb5babf0e7b563e11046bf44ec01a97d1dce9b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\Puitu\fekyon.exe"C:\Users\Admin\AppData\Roaming\Puitu\fekyon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp0fdf5771.bat"2⤵
- Deletes itself
PID:1160
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD511c3d9b8395d82b71ae0bd7e1f5cbeaf
SHA1a0bb754216d461cadab87cd04be7ff882e9f036d
SHA2560ba9eb192d40ffcf45bee30b4a80d0fc8c706083045f0209f7a6c100715fcbdb
SHA5129b9187de68ff1855b7b93baddc790bc024679c3222092582301079fbb9615bb4458f8ddd2105dfb5ad791194ad92c0b6228b200cfc402f3aaabb6b48eb7c0efb
-
Filesize
305KB
MD5c60af29cbdb6208579630063210e67ba
SHA15e21ce4189e5636f90ed5146eac2ea00ac6bc451
SHA2561e395edd3a302bdd62cc48ef80d0e07c5afcd05b3def4fe40ab4c21180b241a9
SHA5127eb70169f434fb5541d34f88eec8dc85aa5df6ec4d0e4b60377ca7281f2206fd80a19daa2a7df081dc9fa90e0e3a50ab89ca79e9cb1debb9e1dc83a2b088a39f
-
Filesize
305KB
MD5c60af29cbdb6208579630063210e67ba
SHA15e21ce4189e5636f90ed5146eac2ea00ac6bc451
SHA2561e395edd3a302bdd62cc48ef80d0e07c5afcd05b3def4fe40ab4c21180b241a9
SHA5127eb70169f434fb5541d34f88eec8dc85aa5df6ec4d0e4b60377ca7281f2206fd80a19daa2a7df081dc9fa90e0e3a50ab89ca79e9cb1debb9e1dc83a2b088a39f
-
Filesize
305KB
MD5c60af29cbdb6208579630063210e67ba
SHA15e21ce4189e5636f90ed5146eac2ea00ac6bc451
SHA2561e395edd3a302bdd62cc48ef80d0e07c5afcd05b3def4fe40ab4c21180b241a9
SHA5127eb70169f434fb5541d34f88eec8dc85aa5df6ec4d0e4b60377ca7281f2206fd80a19daa2a7df081dc9fa90e0e3a50ab89ca79e9cb1debb9e1dc83a2b088a39f