Analysis
-
max time kernel
29s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-10-2023 13:44
Static task
static1
Behavioral task
behavioral1
Sample
SpotifySetup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SpotifySetup.exe
Resource
win10v2004-20230915-en
General
-
Target
SpotifySetup.exe
-
Size
2.8MB
-
MD5
da56532db7d8cb67270fc27697bb524e
-
SHA1
d127c343cc8e7484997f541aeeebec8b63fa39a0
-
SHA256
75ce00349f364e34ca9744edff81d8e7e4237b035a0bea0ab2cf3e5c29e55af9
-
SHA512
6e856cb531dc6752872c7beadf0b6fa24e2457c8d9afa4d240c12b8d297eb6263b34726d8c720458e99d6958ce9917933356bd43f165c936d1304e6c1df85377
-
SSDEEP
49152:y2My0eKmxEyFNfjLmIUlOu7QtmZWNWwG6/MhmdWWjkCIj+yNyRS0b4t4TxCejhzq:
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Executes dropped EXE 2 IoCs
Processes:
7V4OOB3J.exeMJFIUNQV.exepid process 2732 7V4OOB3J.exe 2944 MJFIUNQV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
SpotifySetup.exeMJFIUNQV.exedescription pid process target process PID 3060 wrote to memory of 2732 3060 SpotifySetup.exe 7V4OOB3J.exe PID 3060 wrote to memory of 2732 3060 SpotifySetup.exe 7V4OOB3J.exe PID 3060 wrote to memory of 2732 3060 SpotifySetup.exe 7V4OOB3J.exe PID 3060 wrote to memory of 2732 3060 SpotifySetup.exe 7V4OOB3J.exe PID 3060 wrote to memory of 2944 3060 SpotifySetup.exe MJFIUNQV.exe PID 3060 wrote to memory of 2944 3060 SpotifySetup.exe MJFIUNQV.exe PID 3060 wrote to memory of 2944 3060 SpotifySetup.exe MJFIUNQV.exe PID 2944 wrote to memory of 2140 2944 MJFIUNQV.exe WerFault.exe PID 2944 wrote to memory of 2140 2944 MJFIUNQV.exe WerFault.exe PID 2944 wrote to memory of 2140 2944 MJFIUNQV.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpotifySetup.exe"C:\Users\Admin\AppData\Local\Temp\SpotifySetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\ProgramData\Application Data\7V4OOB3J.exe"C:\ProgramData\Application Data\7V4OOB3J.exe"2⤵
- Executes dropped EXE
PID:2732
-
-
C:\ProgramData\Templates\MJFIUNQV.exe"C:\ProgramData\Templates\MJFIUNQV.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2944 -s 5203⤵PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD56469f63b99f50f188793dc299a452d97
SHA134a1a95f61b52fb9abe41ff317eb36760fd25c65
SHA256e939a8b97ffd09604a1569fcc4017a7d34b2d852b1f775f2e6e5d7e8b34da178
SHA51206c19ca4a557e019e869db1739adfe437657adb4527fedce004792ad8a6ce9baa38702d2e8ac9b9c51072fabb812287d6510abdcd7072f0b25d677fce335295f
-
Filesize
83KB
MD5051c8b584ffde2a373d4a54d038bc46c
SHA1d58abcb0d3875094b51e6836036bf65ff96b8b40
SHA256711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801
SHA5128f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063
-
Filesize
83KB
MD5051c8b584ffde2a373d4a54d038bc46c
SHA1d58abcb0d3875094b51e6836036bf65ff96b8b40
SHA256711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801
SHA5128f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063