Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 07:37
Behavioral task
behavioral1
Sample
system.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
system.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
system.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
system.exe
Resource
win11-20240426-en
General
-
Target
system.exe
-
Size
101KB
-
MD5
2b81bc43a5f1578cb4b5e1db7f1cb700
-
SHA1
6e538da119fa2a0e1f594eca3e83cee428e6ea45
-
SHA256
63bafd0c8173000d3d5a1b05e4167f1254f36491758424dc7575fd3bed0ef28d
-
SHA512
0ebe233706dff5778a4ac3a03106df8d5a9ffbfd880b4dfbf02a847a18e112418d46bb04dc1a28a209477d51616b23ab4f2a68bcfa9584d1c001d4a335618483
-
SSDEEP
1536:A8cKWUH40SsmjFAQ4+Mrw1CPof4a30ahkyYyoe5vda/WrQFVwEKwNuyyU3:A8crUHnm6BjAQazY05FaOrQ3wEK2uA
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
system.exetaskmgr.exepid process 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 1844 system.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
system.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 1844 system.exe Token: SeDebugPrivilege 2052 taskmgr.exe Token: SeSystemProfilePrivilege 2052 taskmgr.exe Token: SeCreateGlobalPrivilege 2052 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
Processes:
taskmgr.exepid process 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
taskmgr.exepid process 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1568
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2052