Analysis

  • max time kernel
    41s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 01:47

General

  • Target

    RarExtInstaller.exe

  • Size

    748KB

  • MD5

    683bb5cff5289f284448f387d5f1d531

  • SHA1

    002e36e7321ceb50d44158bcfcae59575ee63da1

  • SHA256

    a263a46b2e8e46c8d1a9d1202e8b6c10f818a743bd8337e0ef2e6b130a0cf100

  • SHA512

    9c8b2667a67f6491221cb466932f27f0cc1ff7f49936b274dbfd99697452a7493a49f82ace54473c1d59ff99d5629f230fee9d5a88b16349a7e88d140a05f69d

  • SSDEEP

    12288:V6AlwuMQ7p28E3F+ldQCg30ggGposKwWMSyAv33DALt4SQq7teFSd3ud1tgzoaBw:vlwOldQCg30lUosKwWMSP3DAL/p7tePN

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7274515778:AAEx4SxiDLjUG8dht4Cac1HVmxqTSwD_yL4/sendDocument

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RarExtInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\RarExtInstaller.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:1392
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 1716
          3⤵
          • Program crash
          PID:2680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 316
        2⤵
        • Program crash
        PID:4276
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4376 -ip 4376
      1⤵
        PID:2536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3380 -ip 3380
        1⤵
          PID:4536

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3380-1-0x0000000000400000-0x0000000000422000-memory.dmp

          Filesize

          136KB

        • memory/3380-2-0x0000000074C8E000-0x0000000074C8F000-memory.dmp

          Filesize

          4KB

        • memory/3380-3-0x00000000058F0000-0x0000000005956000-memory.dmp

          Filesize

          408KB

        • memory/3380-4-0x0000000006260000-0x00000000062F2000-memory.dmp

          Filesize

          584KB

        • memory/4376-0-0x0000000000620000-0x0000000000621000-memory.dmp

          Filesize

          4KB