Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    18-06-2024 17:44

General

  • Target

    1137bbb4cba39878cec6719df21630df.exe

  • Size

    144KB

  • MD5

    1137bbb4cba39878cec6719df21630df

  • SHA1

    151411f4003522600b279ce9c0cc58bce72201cb

  • SHA256

    de9738bd66cf075e2de53f21c2bcc5b79709c68e7899e9ce3c045ff485e8d499

  • SHA512

    d917be1070d9d85cd6448c24fcdb816cf374236e60494e18e118dc5b94499d2c91073f7716bfc153c1e7dba0c516f5fc339ec9081e244562715d403e7a282713

  • SSDEEP

    3072:EvsbYzhuhNC38S7gzQ/cGD4UFA72iGgWLt/w/HOWJbG5vcX+7kwEKEAm31Dt:ysbxzQ/mrGZw/uWJbGF7REKQ1

Score
10/10

Malware Config

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Modifies registry class 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1137bbb4cba39878cec6719df21630df.exe
    "C:\Users\Admin\AppData\Local\Temp\1137bbb4cba39878cec6719df21630df.exe"
    1⤵
    • Modifies registry class
    PID:1772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1772-0-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp
    Filesize

    4KB

  • memory/1772-1-0x00000000002B0000-0x00000000002DA000-memory.dmp
    Filesize

    168KB

  • memory/1772-2-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp
    Filesize

    9.9MB

  • memory/1772-3-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp
    Filesize

    4KB

  • memory/1772-4-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp
    Filesize

    9.9MB