Resubmissions

12-10-2023 12:35

231012-psttzaac8x 10

04-10-2023 13:44

231004-q16n6sea48 10

Analysis

  • max time kernel
    781s
  • max time network
    746s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 12:35

General

  • Target

    SpotifySetup.exe

  • Size

    2.8MB

  • MD5

    da56532db7d8cb67270fc27697bb524e

  • SHA1

    d127c343cc8e7484997f541aeeebec8b63fa39a0

  • SHA256

    75ce00349f364e34ca9744edff81d8e7e4237b035a0bea0ab2cf3e5c29e55af9

  • SHA512

    6e856cb531dc6752872c7beadf0b6fa24e2457c8d9afa4d240c12b8d297eb6263b34726d8c720458e99d6958ce9917933356bd43f165c936d1304e6c1df85377

  • SSDEEP

    49152:y2My0eKmxEyFNfjLmIUlOu7QtmZWNWwG6/MhmdWWjkCIj+yNyRS0b4t4TxCejhzq:

Malware Config

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SpotifySetup.exe
    "C:\Users\Admin\AppData\Local\Temp\SpotifySetup.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\ProgramData\Start Menu\3D7OX7XQ.exe
      "C:\ProgramData\Start Menu\3D7OX7XQ.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Roaming\Spotify\SpWebInst0.exe
        SpWebInst0.exe /webinstall
        3⤵
        • Executes dropped EXE
        PID:968
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\OP33M0OZ.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\OP33M0OZ.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4224 -s 1960
        3⤵
          PID:1288
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4660

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\3D7OX7XQ.exe

        Filesize

        992KB

        MD5

        6469f63b99f50f188793dc299a452d97

        SHA1

        34a1a95f61b52fb9abe41ff317eb36760fd25c65

        SHA256

        e939a8b97ffd09604a1569fcc4017a7d34b2d852b1f775f2e6e5d7e8b34da178

        SHA512

        06c19ca4a557e019e869db1739adfe437657adb4527fedce004792ad8a6ce9baa38702d2e8ac9b9c51072fabb812287d6510abdcd7072f0b25d677fce335295f

      • C:\ProgramData\Microsoft\Windows\Start Menu\3D7OX7XQ.exe

        Filesize

        992KB

        MD5

        6469f63b99f50f188793dc299a452d97

        SHA1

        34a1a95f61b52fb9abe41ff317eb36760fd25c65

        SHA256

        e939a8b97ffd09604a1569fcc4017a7d34b2d852b1f775f2e6e5d7e8b34da178

        SHA512

        06c19ca4a557e019e869db1739adfe437657adb4527fedce004792ad8a6ce9baa38702d2e8ac9b9c51072fabb812287d6510abdcd7072f0b25d677fce335295f

      • C:\ProgramData\Start Menu\3D7OX7XQ.exe

        Filesize

        992KB

        MD5

        6469f63b99f50f188793dc299a452d97

        SHA1

        34a1a95f61b52fb9abe41ff317eb36760fd25c65

        SHA256

        e939a8b97ffd09604a1569fcc4017a7d34b2d852b1f775f2e6e5d7e8b34da178

        SHA512

        06c19ca4a557e019e869db1739adfe437657adb4527fedce004792ad8a6ce9baa38702d2e8ac9b9c51072fabb812287d6510abdcd7072f0b25d677fce335295f

      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\OP33M0OZ.exe

        Filesize

        83KB

        MD5

        051c8b584ffde2a373d4a54d038bc46c

        SHA1

        d58abcb0d3875094b51e6836036bf65ff96b8b40

        SHA256

        711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801

        SHA512

        8f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063

      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\OP33M0OZ.exe

        Filesize

        83KB

        MD5

        051c8b584ffde2a373d4a54d038bc46c

        SHA1

        d58abcb0d3875094b51e6836036bf65ff96b8b40

        SHA256

        711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801

        SHA512

        8f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063

      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\OP33M0OZ.exe

        Filesize

        83KB

        MD5

        051c8b584ffde2a373d4a54d038bc46c

        SHA1

        d58abcb0d3875094b51e6836036bf65ff96b8b40

        SHA256

        711de934bbdb56f4335d776819d4059222f8b3376fcb4a72ac2fca0a38e45801

        SHA512

        8f28ce2467b8accba63be5a4983df4c8faed25a7f79c1f04560f47009969cbf84fc2afe4e08c2903c17f895afe29e397a91ed579d012f68fe08f0b4261552063

      • C:\Users\Admin\AppData\Roaming\Spotify\SpWebInst0.exe

        Filesize

        94.2MB

        MD5

        07f3ea187e143fa50bbbc510fbb9a820

        SHA1

        562afaedc47e02e51163e51fb8c6d77b610a3302

        SHA256

        742053aeee73a54fd5bd1eb093c3388c63b32368959487c09c7cdbce9823c6df

        SHA512

        0fb8d876aad66665b315091b3e8ccdbb2758c0cee09cfdf5aa8805c1c86138a8d428696a55f3a4f2144ea0b8c67ae4d26c337e14d9651065ef638f69ffb197d2

      • C:\Users\Admin\AppData\Roaming\Spotify\SpWebInst0.exe

        Filesize

        94.2MB

        MD5

        07f3ea187e143fa50bbbc510fbb9a820

        SHA1

        562afaedc47e02e51163e51fb8c6d77b610a3302

        SHA256

        742053aeee73a54fd5bd1eb093c3388c63b32368959487c09c7cdbce9823c6df

        SHA512

        0fb8d876aad66665b315091b3e8ccdbb2758c0cee09cfdf5aa8805c1c86138a8d428696a55f3a4f2144ea0b8c67ae4d26c337e14d9651065ef638f69ffb197d2

      • memory/3008-32-0x00007FFCBE0D0000-0x00007FFCBEB91000-memory.dmp

        Filesize

        10.8MB

      • memory/3008-1-0x00007FFCBE0D0000-0x00007FFCBEB91000-memory.dmp

        Filesize

        10.8MB

      • memory/3008-0-0x00000000003C0000-0x0000000000698000-memory.dmp

        Filesize

        2.8MB

      • memory/3008-27-0x00007FFCBE0D0000-0x00007FFCBEB91000-memory.dmp

        Filesize

        10.8MB

      • memory/4224-25-0x00007FFCBE0D0000-0x00007FFCBEB91000-memory.dmp

        Filesize

        10.8MB

      • memory/4224-30-0x000000001AF20000-0x000000001AF30000-memory.dmp

        Filesize

        64KB

      • memory/4224-29-0x00007FFCBE0D0000-0x00007FFCBEB91000-memory.dmp

        Filesize

        10.8MB

      • memory/4224-28-0x000000001AF20000-0x000000001AF30000-memory.dmp

        Filesize

        64KB

      • memory/4224-24-0x00000000002D0000-0x00000000002EC000-memory.dmp

        Filesize

        112KB