Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2023 03:23
Behavioral task
behavioral1
Sample
eea34c5712ef820615cf10066f19ee96.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
eea34c5712ef820615cf10066f19ee96.exe
Resource
win10v2004-20231215-en
General
-
Target
eea34c5712ef820615cf10066f19ee96.exe
-
Size
9.5MB
-
MD5
eea34c5712ef820615cf10066f19ee96
-
SHA1
edf3b9962a80ec88254f9f40b1727064b34c6060
-
SHA256
0f9e01f100f9cd8db400504d5994f5c8232c318578bb33b807710289d9ef480c
-
SHA512
4c58bda7dad1c62a6cf900c1a0098f7786a9120dcec3fc4576230a8ca724f1921cf3a1ba16bb75ef180b6df3630bf5645d367edb673aaf87cfe340febc9f4770
-
SSDEEP
1536:ZDXYk5HMeaSnGT27QYd/exySO5T3rZaSwEKSKe9TzpmJ:ZzYk5HMebnzddmxa5TbZTwEKSKe9TVE
Malware Config
Extracted
phemedrone
http://mail.moscow-post.su/blog/wp-content/rss.php
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe 3148 eea34c5712ef820615cf10066f19ee96.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3148 eea34c5712ef820615cf10066f19ee96.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eea34c5712ef820615cf10066f19ee96.exe"C:\Users\Admin\AppData\Local\Temp\eea34c5712ef820615cf10066f19ee96.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2712