Resubmissions

01-05-2024 11:36

240501-nq1dasga74 10

01-05-2024 11:33

240501-nnwmbsga28 10

Analysis

  • max time kernel
    83s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 11:33

General

  • Target

    Blaster.rar

  • Size

    65.1MB

  • MD5

    df9039f8873c36812398f7f7bcd9edca

  • SHA1

    cb08ca1fbf02c524ed9b425ecc0ff40d327067e6

  • SHA256

    effd48689ee7728a354cd1520d6193a75eae8dc8b39c954dc3ca132241eb0906

  • SHA512

    f57d4ea8367ef28249c8209f931760f98116e4d57c3beaea71c7f5101fdbc448606cf7a23f101942de583aefeff4dc0ca5b33fd95514ba10f0dc288e6aab8c55

  • SSDEEP

    1572864:wLpnCLVxoqtFOjJbt8vuTO885ctzkqXt6BuqDh9Rm7VKMJ2M:wLgPoqHF88+tz+uqNb652M

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7198738266:AAHTvaHo7OnTgbVRXdKU7z4g6AfvN3nTrb8/sendDocument

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Executes dropped EXE 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Blaster.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Blaster.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2508
  • C:\Users\Admin\Desktop\Blaster\Blaster.exe
    "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 268 -s 656
      2⤵
        PID:2852
    • C:\Users\Admin\Desktop\Blaster\Blaster.exe
      "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
      1⤵
      • Executes dropped EXE
      PID:240
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1592
      • C:\Users\Admin\Desktop\Blaster\Blaster.exe
        "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
        1⤵
        • Executes dropped EXE
        PID:2908
      • C:\Users\Admin\Desktop\Blaster\Blaster.exe
        "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2512 -s 840
          2⤵
            PID:1432
        • C:\Users\Admin\Desktop\Blaster\Blaster.exe
          "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2204 -s 696
            2⤵
              PID:1524
          • C:\Users\Admin\Desktop\Blaster\Blaster.exe
            "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
            1⤵
            • Executes dropped EXE
            PID:2844
          • C:\Windows\system32\wbem\WmiApSrv.exe
            C:\Windows\system32\wbem\WmiApSrv.exe
            1⤵
              PID:2564

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              972e84466912b6b417405038e89780a7

              SHA1

              b610b833d6c1f1bb25aeaf8afe1bd95d75f1f799

              SHA256

              e4ae36de7be1dc7857320a50fc3b0a63814effb87fae3289642f4b6396766ac5

              SHA512

              9cba49fac8307ba7af395af2df8698e417a9b5966901b339a9ed43490161cb0944f16960a008052863f7e38c4e168ac24f9048bd9d70b0f646405b7078bc2d45

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              d49c5e646a1d3026081eefcb0dd965f3

              SHA1

              9e5eefd86c149ee9203388a2667f238f8a8f3dd7

              SHA256

              f50ec502c601116fb27084abcc7a62eeaccd0eec3e1e244f3d9225a87101cdb7

              SHA512

              e90f6c5525f0dae3653c2bef35522457379385ae730d147f610e64a32b228b50400d6c69d389e8227abdfc123ed4a1cc27e7f1eaa232d32ca0dc677eb508bacc

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              8394dedb023b9ec3ba4e4be4c764049d

              SHA1

              84639eeb403d4d207912452f9b826c0929933720

              SHA256

              b77effde05757d9e273cd954ed72480bf38e143c352d2b5dc6cfbd8178b4bf74

              SHA512

              ee75b54dc9b3680371e4db31cefa8bf14df923daeb9ab320e0471ecd7ebd28afe2dfc67b781e02e9e2b8927fb35d2e9f1baf661c7c66ce17bede15078559b19d

            • C:\Users\Admin\AppData\Local\Temp\Cab11FD.tmp

              Filesize

              65KB

              MD5

              ac05d27423a85adc1622c714f2cb6184

              SHA1

              b0fe2b1abddb97837ea0195be70ab2ff14d43198

              SHA256

              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

              SHA512

              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

            • C:\Users\Admin\AppData\Local\Temp\Tar132C.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\Desktop\Blaster\Blaster.exe

              Filesize

              105KB

              MD5

              4a56224d01da9e9bb95d7532f3451cae

              SHA1

              438ae2aa5cba25138b700dae1182ee93b5e0264c

              SHA256

              fb534e9e89aa88bfdb599bcbf37bab89da54fd26ff7ddedc794fc5d05c0fd0c2

              SHA512

              ffaed8481bf8953187ba02c2d1b094d9b0ec2357d8716f60aa6d77096d7c37b2e82cdeb3634d347b89582e97c5aea0f65ef4bda5140fd35178f064e7c3a406cd

            • C:\Users\Admin\Desktop\Blaster\options.txt

              Filesize

              2KB

              MD5

              7b5b91c9901c1a92803afef932295df9

              SHA1

              58324704052734566aab52dc7c9b090883161a78

              SHA256

              73ef4bb7c662a8fb3094bd7255f74873bf15324512af815b55153746edcedf78

              SHA512

              186525a5e686fd314c1c932c7e497a2332f589eb93c47900dae7316b68a9c76d1600adb17913b3a70d658acf7ca997ec164a8d196adf479c1a74e1267ab6df48

            • C:\Users\Admin\Desktop\Blaster\optionsof.txt

              Filesize

              1KB

              MD5

              eea9375b6dc2181a9401a334c4b1851c

              SHA1

              2a1c2c8149223f471e763bb7a64c21d3b2660bd4

              SHA256

              858be3f268e08f9f716d8aaf931d5b3a7581fa2968f45ebae2cc8451b48b2b62

              SHA512

              56a47556a084f5c3ba36a17d1100c9394e11cafee5680436400dd46b97d7f5907018d0607703ae2eb6c0a4aa6f93184242db20dac7090f58f57772c8ed6b4c83

            • memory/268-186-0x0000000000020000-0x0000000000040000-memory.dmp

              Filesize

              128KB

            • memory/2204-278-0x0000000000210000-0x0000000000230000-memory.dmp

              Filesize

              128KB

            • memory/2512-258-0x00000000001C0000-0x00000000001E0000-memory.dmp

              Filesize

              128KB