Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 14:28
Behavioral task
behavioral1
Sample
58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe
-
Size
84KB
-
MD5
823791a9bfed88b3af85698e8f019254
-
SHA1
506803fd5335f75862e0ea271716a6e97cd66b13
-
SHA256
58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f
-
SHA512
40f3dfc08ba7868b1d6310418fc799ea6266e3d70ee098d1ab77213eb4451578a316de0f347101b5b83ac393a793442cd748f8ced56dac71c4de607c0f07da26
-
SSDEEP
1536:zhu9D+Oy/Dn/hP8PGTzBwZ6YWKSO5T3rZvSwEKSK99jzpma:zhu9WL/hEPeGU5S5TbZawEKSK99jVH
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exepid process 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exesvchost.exedescription pid process Token: SeDebugPrivilege 1124 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe Token: SeManageVolumePrivilege 2420 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe"C:\Users\Admin\AppData\Local\Temp\58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2412
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4252
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD56c9777c52bf8226c2df81c799d06e6d9
SHA1e01cf4d351a77093addfa98892e719928160ca82
SHA25680db6d1884beebe888806b71d332110d6e9e2d1d09f569c77af4ad19a136ce3a
SHA512b08170602d88abcb5a415ee9aa4f5a3761939763e05162614ae1fde0a5cb441464aa78df1a777ec913123d3bacebf17d9e0b6c71fe1f649d695cad8c06eb7028