Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-10-2023 02:26
Static task
static1
Behavioral task
behavioral1
Sample
e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe
Resource
win10v2004-20230915-en
General
-
Target
e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe
-
Size
6.7MB
-
MD5
ccec9f6516e38c852b1df13c836e5430
-
SHA1
30e3c298370f32e92d42f586e170996229db8fab
-
SHA256
e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385
-
SHA512
e23d714a352ebda1c75ade3f782159562d34402ebff31511f5b952b247f9b49c039a4b29123762bbffcbe90f3dd6db828bc36deac344a91d75f41346435bbdd1
-
SSDEEP
49152:Fu9q0pxgIYZdVKr2TZO/Ay+tN2ACtcXrGwuh0637dkKg4kGzlXerAEEEEEEEEE20:
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Executes dropped EXE 2 IoCs
Processes:
46UL1YC0.exeA176NUPB.exepid process 1292 46UL1YC0.exe 2264 A176NUPB.exe -
Processes:
resource yara_rule C:\ProgramData\Package Cache\46UL1YC0.exe upx behavioral1/memory/1292-13-0x0000000000C20000-0x00000000013AA000-memory.dmp upx C:\ProgramData\Package Cache\46UL1YC0.exe upx behavioral1/memory/1292-46-0x0000000000C20000-0x00000000013AA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
46UL1YC0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 46UL1YC0.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main 46UL1YC0.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 46UL1YC0.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 46UL1YC0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\46UL1YC0.exe = "11001" 46UL1YC0.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
46UL1YC0.exepid process 1292 46UL1YC0.exe 1292 46UL1YC0.exe 1292 46UL1YC0.exe 1292 46UL1YC0.exe 1292 46UL1YC0.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
46UL1YC0.exedescription pid process Token: SeIncreaseQuotaPrivilege 1292 46UL1YC0.exe Token: SeIncreaseQuotaPrivilege 1292 46UL1YC0.exe Token: SeIncreaseQuotaPrivilege 1292 46UL1YC0.exe Token: SeIncreaseQuotaPrivilege 1292 46UL1YC0.exe Token: SeIncreaseQuotaPrivilege 1292 46UL1YC0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
46UL1YC0.exepid process 1292 46UL1YC0.exe 1292 46UL1YC0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exeA176NUPB.exedescription pid process target process PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 1292 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe 46UL1YC0.exe PID 1832 wrote to memory of 2264 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe A176NUPB.exe PID 1832 wrote to memory of 2264 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe A176NUPB.exe PID 1832 wrote to memory of 2264 1832 e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe A176NUPB.exe PID 2264 wrote to memory of 2876 2264 A176NUPB.exe WerFault.exe PID 2264 wrote to memory of 2876 2264 A176NUPB.exe WerFault.exe PID 2264 wrote to memory of 2876 2264 A176NUPB.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe"C:\Users\Admin\AppData\Local\Temp\e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\ProgramData\Package Cache\46UL1YC0.exe"C:\ProgramData\Package Cache\46UL1YC0.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\ProgramData\Start Menu\A176NUPB.exe"C:\ProgramData\Start Menu\A176NUPB.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2264 -s 5203⤵PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5e025c7bfa143c476a648e9daa3cfda2f
SHA1d4f90ae2727cd20c19802eeee5589fc4e7b36ec3
SHA25695ddb8a73ba1d02c13735fe21f335599e0659b3da7b42e23654650b89d4ddf60
SHA512f9812370e7855acaa15f70a5ee71fa2b78040be72553cc4109276429731ab3a10924fd8e08b8ff91e9c3b0dc57c4bc32168c29416e4a401208fd2574dbd9b8f3
-
Filesize
2.4MB
MD50df3a35807f6a4f361d03c4d66b915e2
SHA175ddf979ab97871cd8980afdf0a83251ac21066b
SHA256e043cecdb27140a347daf9d655b15d68adbcee3a3a7a26a4ba0bd6f581aac62c
SHA5121a2a286ecbc9a151bb47c1ecf2abefc2e54b04b70a94679835ee457205c2cc37713b558a7d33da697191e23c81c3ba7ae9dc421d46ce4d4145ec693d46a14f28
-
Filesize
2.4MB
MD50df3a35807f6a4f361d03c4d66b915e2
SHA175ddf979ab97871cd8980afdf0a83251ac21066b
SHA256e043cecdb27140a347daf9d655b15d68adbcee3a3a7a26a4ba0bd6f581aac62c
SHA5121a2a286ecbc9a151bb47c1ecf2abefc2e54b04b70a94679835ee457205c2cc37713b558a7d33da697191e23c81c3ba7ae9dc421d46ce4d4145ec693d46a14f28
-
Filesize
83KB
MD5e025c7bfa143c476a648e9daa3cfda2f
SHA1d4f90ae2727cd20c19802eeee5589fc4e7b36ec3
SHA25695ddb8a73ba1d02c13735fe21f335599e0659b3da7b42e23654650b89d4ddf60
SHA512f9812370e7855acaa15f70a5ee71fa2b78040be72553cc4109276429731ab3a10924fd8e08b8ff91e9c3b0dc57c4bc32168c29416e4a401208fd2574dbd9b8f3
-
Filesize
1.2MB
MD5fbc34da120e8a3ad11b3ad1404b6c51a
SHA1fe3e36de12e0bdd0a7731e572e862c50ee89207c
SHA2569701b3ba335b5a11be32dd63ea3a466a14e048c1e5881cac81352b459be0f202
SHA512f3f0452d16a7cd0600a8ffced5167783d3f31e51dce512872ade5031c97b14366af0343bfe2c822c8ac4a281f27f5eeb00fe7d0e8cbe90434f79bacf3ecb42d2
-
Filesize
426B
MD5a28ab17b18ff254173dfeef03245efd0
SHA1c6ce20924565644601d4e0dd0fba9dde8dea5c77
SHA256886c0ab69e6e9d9d5b5909451640ea587accfcdf11b8369cad8542d1626ac375
SHA5129371a699921b028bd93c35f9f2896d9997b906c8aba90dd4279abba0ae1909a8808a43bf829584e552ccfe534b2c991a5a7e3e3de7618343f50b1c47cff269d6