Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 23:24
Behavioral task
behavioral1
Sample
Dexytyb.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Dexytyb.exe
Resource
win10v2004-20250314-en
General
-
Target
Dexytyb.exe
-
Size
116KB
-
MD5
57896f23106968a8b964222d0bee5cc2
-
SHA1
c63fcc35b9d6862951a0e0f7cdd0cc8e034c4de5
-
SHA256
edbafdfc5daf3edb477b52fd1aa2376b96a9f08f9a76c1d1a9a686f303742168
-
SHA512
af191c4b48a54506ad41ccac6f0fc96c4ef9d06ccfb8ddaaa9d5a4f5279d072ecf5a1eff4945f808b9990d63491da9b897bacdb53e0030ffb6470802ef0a35bc
-
SSDEEP
1536:IYG01nFGLBQ+Z33RXwvE1osCVSYvY6Kfb875lbyl6bXvYiTz75XIKC4xyYtt:RFFFiZKsKKw75N0IYiL5XIAz
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7831430177:AAHyPrNHXslwzad7nSAEROdQK02cKzd8JCE/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2160 Dexytyb.exe Token: SeDebugPrivilege 1696 taskmgr.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2976 2160 Dexytyb.exe 32 PID 2160 wrote to memory of 2976 2160 Dexytyb.exe 32 PID 2160 wrote to memory of 2976 2160 Dexytyb.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dexytyb.exe"C:\Users\Admin\AppData\Local\Temp\Dexytyb.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2160 -s 16722⤵PID:2976
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1696