Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2023 18:10

General

  • Target

    a604eed1325b12671370e268783cfa74f8675a468492ff98416187d73768b4afexe_JC.exe

  • Size

    2.5MB

  • MD5

    5d4392b56aa4ebac400bbe86fe5d0767

  • SHA1

    a68a6004e111ba899254aa015d93706037c447ff

  • SHA256

    a604eed1325b12671370e268783cfa74f8675a468492ff98416187d73768b4af

  • SHA512

    a2de9b684163bfad13aa23f76f32b4122ef8b9dd3a4ab557d1b395c13aafa62fd475a657cb4cc79183543a0ac2444dc457586ae17079764c27a5ffc94c8230f9

  • SSDEEP

    49152:o3s23i7y2K9TYDnORn+JuXbOoGlQXlSHcBA5TkfZnIZirM5RxivYp:

Malware Config

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a604eed1325b12671370e268783cfa74f8675a468492ff98416187d73768b4afexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a604eed1325b12671370e268783cfa74f8675a468492ff98416187d73768b4afexe_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\Low\D77G4S58.exe
      "C:\Users\Admin\AppData\Local\Temp\Low\D77G4S58.exe"
      2⤵
      • Executes dropped EXE
      PID:1852
    • C:\Users\Admin\AppData\Roaming\Adobe\HMQ3QK18.exe
      "C:\Users\Admin\AppData\Roaming\Adobe\HMQ3QK18.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1068
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Low\D77G4S58.exe

      Filesize

      868KB

      MD5

      53406e9988306cbd4537677c5336aba4

      SHA1

      06becadb92a5fcca2529c0b93687c2a0c6d0d610

      SHA256

      fa1afff978325f8818ce3a559d67a58297d9154674de7fd8eb03656d93104425

      SHA512

      4f89da81b5a3800aa16ff33cc4a42dbb17d4c698a5e2983b88c32738decb57e3088a1da444ad0ec0d745c3c6b6b8b9b86d3f19909142f9e51f513748c0274a99

    • C:\Users\Admin\AppData\Local\Temp\Low\D77G4S58.exe

      Filesize

      868KB

      MD5

      53406e9988306cbd4537677c5336aba4

      SHA1

      06becadb92a5fcca2529c0b93687c2a0c6d0d610

      SHA256

      fa1afff978325f8818ce3a559d67a58297d9154674de7fd8eb03656d93104425

      SHA512

      4f89da81b5a3800aa16ff33cc4a42dbb17d4c698a5e2983b88c32738decb57e3088a1da444ad0ec0d745c3c6b6b8b9b86d3f19909142f9e51f513748c0274a99

    • C:\Users\Admin\AppData\Local\Temp\Low\D77G4S58.exe

      Filesize

      868KB

      MD5

      53406e9988306cbd4537677c5336aba4

      SHA1

      06becadb92a5fcca2529c0b93687c2a0c6d0d610

      SHA256

      fa1afff978325f8818ce3a559d67a58297d9154674de7fd8eb03656d93104425

      SHA512

      4f89da81b5a3800aa16ff33cc4a42dbb17d4c698a5e2983b88c32738decb57e3088a1da444ad0ec0d745c3c6b6b8b9b86d3f19909142f9e51f513748c0274a99

    • C:\Users\Admin\AppData\Roaming\Adobe\HMQ3QK18.exe

      Filesize

      83KB

      MD5

      ae881baa8c3a00a94e5994826bdac3aa

      SHA1

      3f81a9e1cb712b2f69c8ab9104469a436c797706

      SHA256

      2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531

      SHA512

      2e1845235d5cb2c710ab8db068cc9cf744ccd2809e8293ef4ce27d090d071a645524d23517f74bf841aca21ddeea7daa21621b537a63a7ec356db7be6dfc21fc

    • C:\Users\Admin\AppData\Roaming\Adobe\HMQ3QK18.exe

      Filesize

      83KB

      MD5

      ae881baa8c3a00a94e5994826bdac3aa

      SHA1

      3f81a9e1cb712b2f69c8ab9104469a436c797706

      SHA256

      2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531

      SHA512

      2e1845235d5cb2c710ab8db068cc9cf744ccd2809e8293ef4ce27d090d071a645524d23517f74bf841aca21ddeea7daa21621b537a63a7ec356db7be6dfc21fc

    • C:\Users\Admin\AppData\Roaming\Adobe\HMQ3QK18.exe

      Filesize

      83KB

      MD5

      ae881baa8c3a00a94e5994826bdac3aa

      SHA1

      3f81a9e1cb712b2f69c8ab9104469a436c797706

      SHA256

      2c669f5390b14c63c91f4898419792aaee9c0b996dc348419e2ee84179cf3531

      SHA512

      2e1845235d5cb2c710ab8db068cc9cf744ccd2809e8293ef4ce27d090d071a645524d23517f74bf841aca21ddeea7daa21621b537a63a7ec356db7be6dfc21fc

    • memory/1068-24-0x0000000000D50000-0x0000000000D6C000-memory.dmp

      Filesize

      112KB

    • memory/1068-25-0x00007FFEB3B90000-0x00007FFEB4651000-memory.dmp

      Filesize

      10.8MB

    • memory/1068-26-0x000000001BAF0000-0x000000001BB00000-memory.dmp

      Filesize

      64KB

    • memory/1068-29-0x00007FFEB3B90000-0x00007FFEB4651000-memory.dmp

      Filesize

      10.8MB

    • memory/1068-30-0x000000001BAF0000-0x000000001BB00000-memory.dmp

      Filesize

      64KB

    • memory/1068-31-0x00007FFEB3B90000-0x00007FFEB4651000-memory.dmp

      Filesize

      10.8MB

    • memory/4116-3-0x00007FFEB3B90000-0x00007FFEB4651000-memory.dmp

      Filesize

      10.8MB

    • memory/4116-0-0x0000000000180000-0x0000000000402000-memory.dmp

      Filesize

      2.5MB

    • memory/4116-28-0x00007FFEB3B90000-0x00007FFEB4651000-memory.dmp

      Filesize

      10.8MB