Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 23:20
Behavioral task
behavioral1
Sample
Zuma Deluxe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Zuma Deluxe.exe
Resource
win10v2004-20240419-en
General
-
Target
Zuma Deluxe.exe
-
Size
6.9MB
-
MD5
0d7243c3e9eefa5e30c04453623c9182
-
SHA1
f53f043451ad77189616ef823d9d27c9f089a8f7
-
SHA256
08f9ea9a663a5d463b017f8829a8ae6f875f75653433099f803c82188270eae0
-
SHA512
bc40fd2dfdb764161f185932b49727c8545456e1c0f2060801095fa7f4ed0d1d0eadba9e425d6ec000bc06977766d94ad637ea231642475d8531e2c94a6c442b
-
SSDEEP
6144:nHdmxc2EKy9TVDbTi+TAJigC8tYQztwNTOcaOPgOEU20Rz:nHdSyDP4YQRwJOcFPgO1
Malware Config
Extracted
phemedrone
https://rakishevkenes.com/wp-admin/admin-ajax.php
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Zuma Deluxe.exepid process 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe 2192 Zuma Deluxe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Zuma Deluxe.exedescription pid process Token: SeDebugPrivilege 2192 Zuma Deluxe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Zuma Deluxe.exedescription pid process target process PID 2192 wrote to memory of 1920 2192 Zuma Deluxe.exe WerFault.exe PID 2192 wrote to memory of 1920 2192 Zuma Deluxe.exe WerFault.exe PID 2192 wrote to memory of 1920 2192 Zuma Deluxe.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zuma Deluxe.exe"C:\Users\Admin\AppData\Local\Temp\Zuma Deluxe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2192 -s 6882⤵PID:1920
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2600