Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 17:04
Static task
static1
Behavioral task
behavioral1
Sample
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe
-
Size
230KB
-
MD5
ea158c59e8f2e24e539e2931688ac52e
-
SHA1
39290245dc40775d95a3cc792ff41c6e74b7ed57
-
SHA256
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200
-
SHA512
daab2418f17eb0ef7c4ddda330e94ce0c27b8f0cf5c94ff275c031adbf7152101eac98cfb69e2e726c89220190ca314cbcc1b5d17f1cf6409dfe159360f9498f
-
SSDEEP
6144:J29Np5zgWyMWer84eAXtwNNfCKbOXjQj/YHej:4Npt/pWer84eAXtwNNfCKbOEj/YH
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 ip-api.com -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exepid process 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exedescription pid process Token: SeDebugPrivilege 4772 59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\59c71b235595f91647ec9cb99c0b1ccaf2f00d444383a2d0e646f05a989f8200exe_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4952