Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-de -
resource tags
arch:x64arch:x86image:win7-20231023-delocale:de-deos:windows7-x64systemwindows -
submitted
08-11-2023 18:41
Behavioral task
behavioral1
Sample
Iputeny.exe
Resource
win7-20231023-de
Behavioral task
behavioral2
Sample
Iputeny.exe
Resource
win10v2004-20231023-de
General
-
Target
Iputeny.exe
-
Size
84KB
-
MD5
2eae4fc3c124605b2338b611578edf2f
-
SHA1
664bb5841207c075ecc6c82943b6e54d0295bcf2
-
SHA256
64503745802796c734b5c3b6e62a5ba2b40fde46fe5a3ea1e8f7b37b49b2df92
-
SHA512
af615e1346bad0f6fe907dcd7f7f9f184c302440f94b3cde103979a171d84ec753852d6054f9d7e294563dd6bfd7c5b4e5388203183703e5760fa68927f03bfd
-
SSDEEP
1536:e49Lu+af58EPGTtZln8WKSO5T3rZ/SwEKSK99jzpme:e49uf5/PsjntS5TbZKwEKSK99jVL
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot6869946861:AAFp2CTwZLT6Luum35cQR_IF-4kGxK5jIYM/sendMessage?chat_id=6919564136
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Iputeny.exepid process 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe 2236 Iputeny.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Iputeny.exedescription pid process Token: SeDebugPrivilege 2236 Iputeny.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Iputeny.exedescription pid process target process PID 2236 wrote to memory of 2480 2236 Iputeny.exe WerFault.exe PID 2236 wrote to memory of 2480 2236 Iputeny.exe WerFault.exe PID 2236 wrote to memory of 2480 2236 Iputeny.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Iputeny.exe"C:\Users\Admin\AppData\Local\Temp\Iputeny.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2236 -s 17202⤵PID:2480
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2684