Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 17:43
Behavioral task
behavioral1
Sample
0x001a000000015c3e-10.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0x001a000000015c3e-10.exe
Resource
win10v2004-20230915-en
General
-
Target
0x001a000000015c3e-10.exe
-
Size
83KB
-
MD5
e025c7bfa143c476a648e9daa3cfda2f
-
SHA1
d4f90ae2727cd20c19802eeee5589fc4e7b36ec3
-
SHA256
95ddb8a73ba1d02c13735fe21f335599e0659b3da7b42e23654650b89d4ddf60
-
SHA512
f9812370e7855acaa15f70a5ee71fa2b78040be72553cc4109276429731ab3a10924fd8e08b8ff91e9c3b0dc57c4bc32168c29416e4a401208fd2574dbd9b8f3
-
SSDEEP
1536:YNHNY8knGTS8Yd/exySO5T3rZlSwEKSKO9Tzpmp:YNHNYfnrZdmxa5TbZYwEKSKO9TVk
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
0x001a000000015c3e-10.exepid process 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe 3716 0x001a000000015c3e-10.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0x001a000000015c3e-10.exedescription pid process Token: SeDebugPrivilege 3716 0x001a000000015c3e-10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x001a000000015c3e-10.exe"C:\Users\Admin\AppData\Local\Temp\0x001a000000015c3e-10.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1984