Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 06:23
Behavioral task
behavioral1
Sample
Temykok.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Temykok.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Temykok.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Temykok.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
Temykok.exe
Resource
win11-20241007-en
General
-
Target
Temykok.exe
-
Size
138KB
-
MD5
d019e04c6c70e8fb44dd3dfe0a487411
-
SHA1
19820dcd467a0b0d8e70d0aa8cbb3004de9faa6c
-
SHA256
0f440a7745bfbba3947f5a104dab6f3e1ad202ff5a99d63ab53762161964305a
-
SHA512
aa3d70055bff36220da5735581057763d20e02021a99c1f733a58b949672b7eef43d52f9d6a5418cfe14a8d87ead5ba2708a9cbb1f77024d7f3998b743a08e6e
-
SSDEEP
3072:UHx8zR4oJ8byNKS+qHXwTs/8H1lsm53hvHcRAlY+Ejv/WQA:Ag4ycS+ggKCpvuNRjvF
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot8185640178:AAEe-sIhlh5lPD_qjEnaSBnrB-YWsmO-Jcg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2324 Temykok.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 Temykok.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2664 2324 Temykok.exe 32 PID 2324 wrote to memory of 2664 2324 Temykok.exe 32 PID 2324 wrote to memory of 2664 2324 Temykok.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temykok.exe"C:\Users\Admin\AppData\Local\Temp\Temykok.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2324 -s 8282⤵PID:2664
-