Overview
overview
10Static
static
3Launch_thi...e).bat
windows7-x64
10Launch_thi...e).bat
windows10-2004-x64
10License.exe
windows7-x64
10License.exe
windows10-2004-x64
10TrixXPloit.exe
windows7-x64
10TrixXPloit.exe
windows10-2004-x64
10autoexec.lnk
windows7-x64
3autoexec.lnk
windows10-2004-x64
3workspace.lnk
windows7-x64
3workspace.lnk
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 09:47
Static task
static1
Behavioral task
behavioral1
Sample
Launch_this(Not_exe file).bat
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Launch_this(Not_exe file).bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
License.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
License.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
TrixXPloit.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
TrixXPloit.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
autoexec.lnk
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
autoexec.lnk
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
workspace.lnk
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
workspace.lnk
Resource
win10v2004-20240221-en
General
-
Target
License.exe
-
Size
223KB
-
MD5
c4a30082317aa701d555c0cb1a3345a8
-
SHA1
cd36010d6bb2c282eae20edc14b25c61bb70e28d
-
SHA256
22b3ba3c3572cab0bd553ac397e311e85bf64ac3aa1c7f315b3a5fe19d3cd3de
-
SHA512
002a050ed15c05d82cec7da4d889e25b4ed9f17355993709443f8af9ffd0a00bf2a034f2dd0c247a001ef7f1e91bee08e291f98768dcb6a89fe666562815524b
-
SSDEEP
6144:pJfzvwSFMUOCsCnOIksBNQG2Nk8NeI/qt7:LfjwSFsCsC/B8pNSl
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2460 1988 WerFault.exe License.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
License.exepid process 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe 1988 License.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
License.exedescription pid process Token: SeDebugPrivilege 1988 License.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
License.exedescription pid process target process PID 1988 wrote to memory of 2460 1988 License.exe WerFault.exe PID 1988 wrote to memory of 2460 1988 License.exe WerFault.exe PID 1988 wrote to memory of 2460 1988 License.exe WerFault.exe PID 1988 wrote to memory of 2460 1988 License.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\License.exe"C:\Users\Admin\AppData\Local\Temp\License.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 17642⤵
- Program crash
PID:2460
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2208