Analysis
-
max time kernel
29s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2024 07:37
Behavioral task
behavioral1
Sample
system.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
system.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
system.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
system.exe
Resource
win11-20240426-en
General
-
Target
system.exe
-
Size
101KB
-
MD5
2b81bc43a5f1578cb4b5e1db7f1cb700
-
SHA1
6e538da119fa2a0e1f594eca3e83cee428e6ea45
-
SHA256
63bafd0c8173000d3d5a1b05e4167f1254f36491758424dc7575fd3bed0ef28d
-
SHA512
0ebe233706dff5778a4ac3a03106df8d5a9ffbfd880b4dfbf02a847a18e112418d46bb04dc1a28a209477d51616b23ab4f2a68bcfa9584d1c001d4a335618483
-
SSDEEP
1536:A8cKWUH40SsmjFAQ4+Mrw1CPof4a30ahkyYyoe5vda/WrQFVwEKwNuyyU3:A8crUHnm6BjAQazY05FaOrQ3wEK2uA
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
system.exetaskmgr.exepid process 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4656 system.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
system.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 4656 system.exe Token: SeDebugPrivilege 4476 taskmgr.exe Token: SeSystemProfilePrivilege 4476 taskmgr.exe Token: SeCreateGlobalPrivilege 4476 taskmgr.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
Processes:
taskmgr.exepid process 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
taskmgr.exepid process 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe 4476 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2956
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4476