Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2023 04:44

General

  • Target

    NEAS.e74b8c7dfcf9ccf4cce06b7481bc06c0.exe

  • Size

    4.9MB

  • MD5

    e74b8c7dfcf9ccf4cce06b7481bc06c0

  • SHA1

    c1b3d72fb4b04462d894e5478ea1da26af0932c6

  • SHA256

    976ab5ad4822144756c44ce8fb0426f62e26d9d579d0cb5211c1701be681e775

  • SHA512

    7dad6ebde32bb186dda82c8efda7f46dc2523ac4180f78c9368c0d35eb757b48525dbcf5f65c42f38a42f3253fcee7246646075e22a3ef4a1a6e64b769e875ef

  • SSDEEP

    98304:usadS1IAMpZL6DZ4x0z5vzg2ObHhpfkKmCNHBANF1bkzTtwOUcO:u/ZAaMxZZiBeCNHyzbklwOUcO

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot6526296839:AAHf93IZJTXM1F9tUJGQR-zriuV-RU7enBM/sendMessage?chat_id=872309541

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e74b8c7dfcf9ccf4cce06b7481bc06c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e74b8c7dfcf9ccf4cce06b7481bc06c0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\fluxus2_protected.exe
      "C:\Users\Admin\AppData\Local\Temp\fluxus2_protected.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Users\Admin\AppData\Local\Temp\crypt.exe
        "C:\Users\Admin\AppData\Local\Temp\crypt.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 2724
          4⤵
          • Program crash
          PID:2564
    • C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe
      "C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5048
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 740 -ip 740
      1⤵
        PID:3444

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe

        Filesize

        3.9MB

        MD5

        b4f9cbca656fd34c4dbb1d706a7f1ad3

        SHA1

        2b95d88a80ccb619b581c420f7435c660cfbb28e

        SHA256

        1e022d3886700317e5c41977de8fd595db5fbb3529164048ed09ee7efdb5711d

        SHA512

        5ed86eaf8ae42d9a8f0dca9776e25b3c2232434b32088df7feaa8149886594f1d4b1e37c597597eacebdb4082e0263441a6b78def5eef2ad610a6875c28fe969

      • C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe

        Filesize

        3.9MB

        MD5

        b4f9cbca656fd34c4dbb1d706a7f1ad3

        SHA1

        2b95d88a80ccb619b581c420f7435c660cfbb28e

        SHA256

        1e022d3886700317e5c41977de8fd595db5fbb3529164048ed09ee7efdb5711d

        SHA512

        5ed86eaf8ae42d9a8f0dca9776e25b3c2232434b32088df7feaa8149886594f1d4b1e37c597597eacebdb4082e0263441a6b78def5eef2ad610a6875c28fe969

      • C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe

        Filesize

        3.9MB

        MD5

        b4f9cbca656fd34c4dbb1d706a7f1ad3

        SHA1

        2b95d88a80ccb619b581c420f7435c660cfbb28e

        SHA256

        1e022d3886700317e5c41977de8fd595db5fbb3529164048ed09ee7efdb5711d

        SHA512

        5ed86eaf8ae42d9a8f0dca9776e25b3c2232434b32088df7feaa8149886594f1d4b1e37c597597eacebdb4082e0263441a6b78def5eef2ad610a6875c28fe969

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yvqx2u25.3zd.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\crypt.exe

        Filesize

        1.1MB

        MD5

        9c3fce3559267764af96c25e4ca8f6c7

        SHA1

        7093daa7954d11248f371c143f1d0825dc87fd85

        SHA256

        badd2b7ef518bf58283b4180cce248396e8beecdaacf6b5d1b5c3ef12da2c238

        SHA512

        957250a44d22f91f342e2a6290121c583770879598f848c4aa20ddb4fc8ed4404ae382f03ab75368d19ae4d90030c44262c6084ac7e83cccd4542a0344be66b0

      • C:\Users\Admin\AppData\Local\Temp\crypt.exe

        Filesize

        1.1MB

        MD5

        9c3fce3559267764af96c25e4ca8f6c7

        SHA1

        7093daa7954d11248f371c143f1d0825dc87fd85

        SHA256

        badd2b7ef518bf58283b4180cce248396e8beecdaacf6b5d1b5c3ef12da2c238

        SHA512

        957250a44d22f91f342e2a6290121c583770879598f848c4aa20ddb4fc8ed4404ae382f03ab75368d19ae4d90030c44262c6084ac7e83cccd4542a0344be66b0

      • C:\Users\Admin\AppData\Local\Temp\crypt.exe

        Filesize

        1.1MB

        MD5

        9c3fce3559267764af96c25e4ca8f6c7

        SHA1

        7093daa7954d11248f371c143f1d0825dc87fd85

        SHA256

        badd2b7ef518bf58283b4180cce248396e8beecdaacf6b5d1b5c3ef12da2c238

        SHA512

        957250a44d22f91f342e2a6290121c583770879598f848c4aa20ddb4fc8ed4404ae382f03ab75368d19ae4d90030c44262c6084ac7e83cccd4542a0344be66b0

      • C:\Users\Admin\AppData\Local\Temp\fluxus2_protected.exe

        Filesize

        2.4MB

        MD5

        a768c386ac833969acd939af76af2968

        SHA1

        f41bd3d0e7c8330e9f08ff5ca23d6096ea6519fa

        SHA256

        7d247252300633c5823d6b0241794448731b9d5a306cf1e43ecc5d4c83c1d676

        SHA512

        3fbc4fa7ffa2803135d918a156a5c4d3fcf709cd6e3500fdb2367c2355ecb31b5cc6e05a283d99f5fcea3e8e623065c6c89935fe3ca5896a950c308d34ae4e94

      • C:\Users\Admin\AppData\Local\Temp\fluxus2_protected.exe

        Filesize

        2.4MB

        MD5

        a768c386ac833969acd939af76af2968

        SHA1

        f41bd3d0e7c8330e9f08ff5ca23d6096ea6519fa

        SHA256

        7d247252300633c5823d6b0241794448731b9d5a306cf1e43ecc5d4c83c1d676

        SHA512

        3fbc4fa7ffa2803135d918a156a5c4d3fcf709cd6e3500fdb2367c2355ecb31b5cc6e05a283d99f5fcea3e8e623065c6c89935fe3ca5896a950c308d34ae4e94

      • \??\c:\users\admin\appdata\local\temp\fluxus2_protected.exe

        Filesize

        2.4MB

        MD5

        a768c386ac833969acd939af76af2968

        SHA1

        f41bd3d0e7c8330e9f08ff5ca23d6096ea6519fa

        SHA256

        7d247252300633c5823d6b0241794448731b9d5a306cf1e43ecc5d4c83c1d676

        SHA512

        3fbc4fa7ffa2803135d918a156a5c4d3fcf709cd6e3500fdb2367c2355ecb31b5cc6e05a283d99f5fcea3e8e623065c6c89935fe3ca5896a950c308d34ae4e94

      • memory/740-94-0x0000000072F70000-0x0000000073720000-memory.dmp

        Filesize

        7.7MB

      • memory/740-43-0x0000000072F70000-0x0000000073720000-memory.dmp

        Filesize

        7.7MB

      • memory/740-95-0x00000000002E0000-0x0000000000660000-memory.dmp

        Filesize

        3.5MB

      • memory/740-47-0x0000000006000000-0x0000000006010000-memory.dmp

        Filesize

        64KB

      • memory/740-39-0x00000000002E0000-0x0000000000660000-memory.dmp

        Filesize

        3.5MB

      • memory/740-45-0x00000000056C0000-0x0000000005726000-memory.dmp

        Filesize

        408KB

      • memory/740-42-0x00000000002E0000-0x0000000000660000-memory.dmp

        Filesize

        3.5MB

      • memory/740-44-0x00000000002E0000-0x0000000000660000-memory.dmp

        Filesize

        3.5MB

      • memory/4676-17-0x0000000000240000-0x0000000000631000-memory.dmp

        Filesize

        3.9MB

      • memory/4676-40-0x0000000000240000-0x0000000000631000-memory.dmp

        Filesize

        3.9MB

      • memory/5048-48-0x0000000006340000-0x0000000006378000-memory.dmp

        Filesize

        224KB

      • memory/5048-71-0x00000000053D0000-0x00000000053E0000-memory.dmp

        Filesize

        64KB

      • memory/5048-46-0x000000000A1D0000-0x000000000A1D8000-memory.dmp

        Filesize

        32KB

      • memory/5048-38-0x0000000005D50000-0x00000000062F4000-memory.dmp

        Filesize

        5.6MB

      • memory/5048-49-0x0000000006310000-0x000000000631E000-memory.dmp

        Filesize

        56KB

      • memory/5048-37-0x00000000053D0000-0x00000000053E0000-memory.dmp

        Filesize

        64KB

      • memory/5048-50-0x000000000B850000-0x000000000BE78000-memory.dmp

        Filesize

        6.2MB

      • memory/5048-33-0x00000000053D0000-0x00000000053E0000-memory.dmp

        Filesize

        64KB

      • memory/5048-62-0x000000000B3C0000-0x000000000B3DA000-memory.dmp

        Filesize

        104KB

      • memory/5048-63-0x000000000C080000-0x000000000C0B6000-memory.dmp

        Filesize

        216KB

      • memory/5048-64-0x000000000C740000-0x000000000CDBA000-memory.dmp

        Filesize

        6.5MB

      • memory/5048-65-0x000000000C160000-0x000000000C1F6000-memory.dmp

        Filesize

        600KB

      • memory/5048-66-0x000000000C0F0000-0x000000000C112000-memory.dmp

        Filesize

        136KB

      • memory/5048-67-0x000000000C120000-0x000000000C13E000-memory.dmp

        Filesize

        120KB

      • memory/5048-68-0x000000000C2E0000-0x000000000C32A000-memory.dmp

        Filesize

        296KB

      • memory/5048-69-0x000000000CDC0000-0x000000000D114000-memory.dmp

        Filesize

        3.3MB

      • memory/5048-70-0x000000000D120000-0x000000000D186000-memory.dmp

        Filesize

        408KB

      • memory/5048-41-0x0000000005850000-0x00000000058E2000-memory.dmp

        Filesize

        584KB

      • memory/5048-72-0x000000000D190000-0x000000000D1B2000-memory.dmp

        Filesize

        136KB

      • memory/5048-73-0x000000000D360000-0x000000000D3AC000-memory.dmp

        Filesize

        304KB

      • memory/5048-83-0x000000000E600000-0x000000000E61E000-memory.dmp

        Filesize

        120KB

      • memory/5048-84-0x000000000E620000-0x000000000E6C3000-memory.dmp

        Filesize

        652KB

      • memory/5048-85-0x000000000E8A0000-0x000000000E8AA000-memory.dmp

        Filesize

        40KB

      • memory/5048-86-0x000000000E8D0000-0x000000000E8E1000-memory.dmp

        Filesize

        68KB

      • memory/5048-88-0x000000000E900000-0x000000000E90E000-memory.dmp

        Filesize

        56KB

      • memory/5048-89-0x000000000E910000-0x000000000E924000-memory.dmp

        Filesize

        80KB

      • memory/5048-90-0x000000000E950000-0x000000000E96A000-memory.dmp

        Filesize

        104KB

      • memory/5048-91-0x000000000E970000-0x000000000E978000-memory.dmp

        Filesize

        32KB

      • memory/5048-92-0x000000000D3E0000-0x000000000D3E8000-memory.dmp

        Filesize

        32KB

      • memory/5048-25-0x0000000000780000-0x0000000000B74000-memory.dmp

        Filesize

        4.0MB

      • memory/5048-24-0x0000000072F70000-0x0000000073720000-memory.dmp

        Filesize

        7.7MB

      • memory/5048-96-0x0000000072F70000-0x0000000073720000-memory.dmp

        Filesize

        7.7MB

      • memory/5048-97-0x00000000053D0000-0x00000000053E0000-memory.dmp

        Filesize

        64KB

      • memory/5048-99-0x00000000053D0000-0x00000000053E0000-memory.dmp

        Filesize

        64KB

      • memory/5048-100-0x00000000053D0000-0x00000000053E0000-memory.dmp

        Filesize

        64KB