Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-10-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe
Resource
win10v2004-20230915-en
General
-
Target
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe
-
Size
230KB
-
MD5
ea158c59e8f2e24e539e2931688ac52e
-
SHA1
39290245dc40775d95a3cc792ff41c6e74b7ed57
-
SHA256
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200
-
SHA512
daab2418f17eb0ef7c4ddda330e94ce0c27b8f0cf5c94ff275c031adbf7152101eac98cfb69e2e726c89220190ca314cbcc1b5d17f1cf6409dfe159360f9498f
-
SSDEEP
6144:J29Np5zgWyMWer84eAXtwNNfCKbOXjQj/YHej:4Npt/pWer84eAXtwNNfCKbOEj/YH
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exepid process 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exedescription pid process Token: SeDebugPrivilege 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exedescription pid process target process PID 2040 wrote to memory of 2840 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe WerFault.exe PID 2040 wrote to memory of 2840 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe WerFault.exe PID 2040 wrote to memory of 2840 2040 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe"C:\Users\Admin\AppData\Local\Temp\59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2040 -s 22762⤵PID:2840
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2672