Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05-10-2023 16:38
Behavioral task
behavioral1
Sample
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe
-
Size
83KB
-
MD5
ae881baa8c3a00a94e5994826bdac3aa
-
SHA1
3f81a9e1cb712b2f69c8ab9104469a436c797706
-
SHA256
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531
-
SHA512
2e1845235d5cb2c710ab8db068cc9cf744ccd2809e8293ef4ce27d090d071a645524d23517f74bf841aca21ddeea7daa21621b537a63a7ec356db7be6dfc21fc
-
SSDEEP
1536:+9EQCqXnMyJ5ePGTtS92QWKSO5T3rZSSwEKSKO9jzpmN:+9EkM+MPou2hS5TbZLwEKSKO9jV4
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exepid process 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exedescription pid process Token: SeDebugPrivilege 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exedescription pid process target process PID 2104 wrote to memory of 2500 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe WerFault.exe PID 2104 wrote to memory of 2500 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe WerFault.exe PID 2104 wrote to memory of 2500 2104 2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531exe_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2104 -s 7162⤵PID:2500
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2536