Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
vlad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vlad.exe
Resource
win10v2004-20231215-en
General
-
Target
vlad.exe
-
Size
512KB
-
MD5
0dd8757d42380787ba7162a7776f30c5
-
SHA1
18465ff3c76fc6c441a195b679047f9089b269de
-
SHA256
a6ed050ec8b21feafd3335a3396258be13a2d29601030be8f4b20c682759a2fb
-
SHA512
d0a8354a7af21702f70b5ef7f3440a4755b6e1bb4e39a5c821fcac34e2f019dc73243764ef037efb2ad4de05855ced057d95bc8cdfa1c74ebb27194421297c22
-
SSDEEP
12288:ol3p6elUM8ucJxlekO10C/aWoRWn8nmbkVfXnsfubmKpX:ol3p7lMucJtCyW2Wn8nmbkVfXnsmbmA
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot6719312271:AAE1QFaFTcG0HSHiQXVv7gdDUMwSNOPMadg/sendMessage?chat_id=-4194654645
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vlad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vlad.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe 3556 vlad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3556 vlad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vlad.exe"C:\Users\Admin\AppData\Local\Temp\vlad.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1648