Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 07:04
Behavioral task
behavioral1
Sample
ee6038d5c37842bc34a6e17fd8478339.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee6038d5c37842bc34a6e17fd8478339.exe
Resource
win10v2004-20240412-en
General
-
Target
ee6038d5c37842bc34a6e17fd8478339.exe
-
Size
97KB
-
MD5
ee6038d5c37842bc34a6e17fd8478339
-
SHA1
2259364fc16b0c344e35b8afc0182e79857917b6
-
SHA256
457461a6ad3b12a397d8ab96da9355dcb9954576c6552f3f8dc2d7e80ac17a6c
-
SHA512
e833440b4f3533020bf498511fb5d78b3d9cf21fb04d020a696b3714920869fb62b2f73272e99f224e317ff03f214581ba4bb2b53925d3d8225d672b3e493e67
-
SSDEEP
1536:n+G1e0GWGl4tS6Bh1pI//W/9/fnFP5psgnCyQqJSwEKMiV7LU:n+Gs0il4jI/uF3nt5OgnCyQrwEKlhA
Malware Config
Extracted
phemedrone
http://77.221.151.42/dashboard/gate.php
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ipinfo.io 32 ipinfo.io -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ee6038d5c37842bc34a6e17fd8478339.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ee6038d5c37842bc34a6e17fd8478339.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ee6038d5c37842bc34a6e17fd8478339.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
ee6038d5c37842bc34a6e17fd8478339.exepid process 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe 3420 ee6038d5c37842bc34a6e17fd8478339.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ee6038d5c37842bc34a6e17fd8478339.exedescription pid process Token: SeDebugPrivilege 3420 ee6038d5c37842bc34a6e17fd8478339.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee6038d5c37842bc34a6e17fd8478339.exe"C:\Users\Admin\AppData\Local\Temp\ee6038d5c37842bc34a6e17fd8478339.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1476