Analysis

  • max time kernel
    126s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 07:05

General

  • Target

    421c40695b1537b040830d13b7b860d8.exe

  • Size

    89KB

  • MD5

    421c40695b1537b040830d13b7b860d8

  • SHA1

    a63377c184c808116f7c192cd7c5f4dd763a77d3

  • SHA256

    a48ed05b6c117fd2ecf7c9bbf17ae3253e6aab133cdd4a06da54298635a136a5

  • SHA512

    27564661871e700fea1ef7e2d28e739e32a0c580323fbb42c5139a64b68afffae7ac9445eb7d304502b22bacb64c611a05392a19a59a4b30ddd4bad1aa59e2f0

  • SSDEEP

    1536:Uf4b9BKhaUxo6TRMinLvIbzV6A2SYzEdV4c7Raeiq:Uf4b9IJxZTLnL4aSY4dVD3D

Malware Config

Extracted

Family

phemedrone

C2

http://77.221.151.42/dashboard/gate.php

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Downloads MZ/PE file
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\421c40695b1537b040830d13b7b860d8.exe
    "C:\Users\Admin\AppData\Local\Temp\421c40695b1537b040830d13b7b860d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3460
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:376
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:2856
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3112

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2424-9-0x00007FF947640000-0x00007FF948101000-memory.dmp

        Filesize

        10.8MB

      • memory/2424-2-0x00007FF947640000-0x00007FF948101000-memory.dmp

        Filesize

        10.8MB

      • memory/2424-3-0x0000000002C90000-0x0000000002CA0000-memory.dmp

        Filesize

        64KB

      • memory/2424-4-0x00007FF947640000-0x00007FF948101000-memory.dmp

        Filesize

        10.8MB

      • memory/2424-5-0x000000001BC90000-0x000000001BCCC000-memory.dmp

        Filesize

        240KB

      • memory/2424-6-0x0000000002E70000-0x0000000002E71000-memory.dmp

        Filesize

        4KB

      • memory/2424-0-0x0000000000AB0000-0x0000000000ACA000-memory.dmp

        Filesize

        104KB

      • memory/3112-53-0x00000197FD150000-0x00000197FD151000-memory.dmp

        Filesize

        4KB

      • memory/3112-17-0x00000197F4BA0000-0x00000197F4BB0000-memory.dmp

        Filesize

        64KB

      • memory/3112-52-0x00000197FD040000-0x00000197FD041000-memory.dmp

        Filesize

        4KB

      • memory/3112-51-0x00000197FD040000-0x00000197FD041000-memory.dmp

        Filesize

        4KB

      • memory/3112-49-0x00000197FD010000-0x00000197FD011000-memory.dmp

        Filesize

        4KB

      • memory/3112-33-0x00000197F4CA0000-0x00000197F4CB0000-memory.dmp

        Filesize

        64KB

      • memory/3460-10-0x00000000743F0000-0x0000000074BA0000-memory.dmp

        Filesize

        7.7MB

      • memory/3460-15-0x00000000743F0000-0x0000000074BA0000-memory.dmp

        Filesize

        7.7MB

      • memory/3460-13-0x00000000058F0000-0x0000000005956000-memory.dmp

        Filesize

        408KB

      • memory/3460-12-0x00000000051F0000-0x0000000005282000-memory.dmp

        Filesize

        584KB

      • memory/3460-11-0x0000000005380000-0x0000000005390000-memory.dmp

        Filesize

        64KB

      • memory/3460-7-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB