Resubmissions

01-05-2024 11:36

240501-nq1dasga74 10

01-05-2024 11:33

240501-nnwmbsga28 10

Analysis

  • max time kernel
    66s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 11:36

General

  • Target

    Blaster.rar

  • Size

    65.1MB

  • MD5

    df9039f8873c36812398f7f7bcd9edca

  • SHA1

    cb08ca1fbf02c524ed9b425ecc0ff40d327067e6

  • SHA256

    effd48689ee7728a354cd1520d6193a75eae8dc8b39c954dc3ca132241eb0906

  • SHA512

    f57d4ea8367ef28249c8209f931760f98116e4d57c3beaea71c7f5101fdbc448606cf7a23f101942de583aefeff4dc0ca5b33fd95514ba10f0dc288e6aab8c55

  • SSDEEP

    1572864:wLpnCLVxoqtFOjJbt8vuTO885ctzkqXt6BuqDh9Rm7VKMJ2M:wLgPoqHF88+tz+uqNb652M

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7198738266:AAHTvaHo7OnTgbVRXdKU7z4g6AfvN3nTrb8/sendDocument

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Blaster.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Blaster.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2040
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Blaster\options.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2076
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Blaster\optionsof.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:428
  • C:\Users\Admin\Desktop\Blaster\Blaster.exe
    "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1988
  • C:\Users\Admin\Desktop\Blaster\Blaster.exe
    "C:\Users\Admin\Desktop\Blaster\Blaster.exe"
    1⤵
    • Executes dropped EXE
    PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\Blaster\Blaster.exe

    Filesize

    105KB

    MD5

    4a56224d01da9e9bb95d7532f3451cae

    SHA1

    438ae2aa5cba25138b700dae1182ee93b5e0264c

    SHA256

    fb534e9e89aa88bfdb599bcbf37bab89da54fd26ff7ddedc794fc5d05c0fd0c2

    SHA512

    ffaed8481bf8953187ba02c2d1b094d9b0ec2357d8716f60aa6d77096d7c37b2e82cdeb3634d347b89582e97c5aea0f65ef4bda5140fd35178f064e7c3a406cd

  • C:\Users\Admin\Desktop\Blaster\options.txt

    Filesize

    2KB

    MD5

    7b5b91c9901c1a92803afef932295df9

    SHA1

    58324704052734566aab52dc7c9b090883161a78

    SHA256

    73ef4bb7c662a8fb3094bd7255f74873bf15324512af815b55153746edcedf78

    SHA512

    186525a5e686fd314c1c932c7e497a2332f589eb93c47900dae7316b68a9c76d1600adb17913b3a70d658acf7ca997ec164a8d196adf479c1a74e1267ab6df48

  • C:\Users\Admin\Desktop\Blaster\optionsof.txt

    Filesize

    1KB

    MD5

    eea9375b6dc2181a9401a334c4b1851c

    SHA1

    2a1c2c8149223f471e763bb7a64c21d3b2660bd4

    SHA256

    858be3f268e08f9f716d8aaf931d5b3a7581fa2968f45ebae2cc8451b48b2b62

    SHA512

    56a47556a084f5c3ba36a17d1100c9394e11cafee5680436400dd46b97d7f5907018d0607703ae2eb6c0a4aa6f93184242db20dac7090f58f57772c8ed6b4c83

  • memory/1988-188-0x0000000001100000-0x0000000001120000-memory.dmp

    Filesize

    128KB