Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-10-2023 13:47
Static task
static1
Behavioral task
behavioral1
Sample
255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe
Resource
win10v2004-20230915-en
General
-
Target
255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe
-
Size
3.8MB
-
MD5
4c51b62c9ee7a37ddc010e48b516c243
-
SHA1
77b6f4ce0867078a8d7c02fa1254912b6f4c0d00
-
SHA256
255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c
-
SHA512
8e292a6125309ad8e26606b4682001a8cfa8038818a9b28e4070a5133b73083bac608c48f00ae30e38fea170186de7e5da9c3528f8a55685c44d923c029e1adb
-
SSDEEP
49152:T+eKofn4V0kl/gaMHqAwl6hXsM75LwV71pG7XPQx7PtwlSr+Ucbf3QC3aLVeolcB:
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Executes dropped EXE 2 IoCs
Processes:
K3ML3SZ0.exeTN4HHSUX.exepid process 2940 K3ML3SZ0.exe 2612 TN4HHSUX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
K3ML3SZ0.exepid process 2940 K3ML3SZ0.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exeTN4HHSUX.exedescription pid process target process PID 2984 wrote to memory of 2940 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe K3ML3SZ0.exe PID 2984 wrote to memory of 2940 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe K3ML3SZ0.exe PID 2984 wrote to memory of 2940 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe K3ML3SZ0.exe PID 2984 wrote to memory of 2940 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe K3ML3SZ0.exe PID 2984 wrote to memory of 2612 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe TN4HHSUX.exe PID 2984 wrote to memory of 2612 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe TN4HHSUX.exe PID 2984 wrote to memory of 2612 2984 255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe TN4HHSUX.exe PID 2612 wrote to memory of 2620 2612 TN4HHSUX.exe WerFault.exe PID 2612 wrote to memory of 2620 2612 TN4HHSUX.exe WerFault.exe PID 2612 wrote to memory of 2620 2612 TN4HHSUX.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe"C:\Users\Admin\AppData\Local\Temp\255d887e4aee44b4a811fd99c76d7df6ce442316125d236f9b3891bd56b82f8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\K3ML3SZ0.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\K3ML3SZ0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
C:\Users\Admin\AppData\Roaming\Adobe\TN4HHSUX.exe"C:\Users\Admin\AppData\Roaming\Adobe\TN4HHSUX.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2612 -s 5203⤵PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\K3ML3SZ0.exe
Filesize1.3MB
MD5126d1dba7efc0faed18afa036fb0468b
SHA1fe58c79cc3b5d11d9c1fbf53db1e0d726c94c491
SHA256adb8b6cfb9633759f3a08ecb160790aaa6a733d5671991c21a5a28deafbeef26
SHA512a3c32b7b4961c13c4fafb1b71b123bf4d0ecdfc4087912429019fb63aaf17f132ae2c58135f2ea8d64643966e99a28c89fc67c6256e9dafcb310049ab6951ad9
-
Filesize
83KB
MD5051c8b584ffde2a373d4a54d038bc46c
SHA1d58abcb0d3875094b51e6836036bf65ff96b8b40
SHA256711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801
SHA5128f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063
-
Filesize
83KB
MD5051c8b584ffde2a373d4a54d038bc46c
SHA1d58abcb0d3875094b51e6836036bf65ff96b8b40
SHA256711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801
SHA5128f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063