Analysis

  • max time kernel
    30s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 15:47

General

  • Target

    Iguduvu.exe

  • Size

    115KB

  • MD5

    d6dbf35249ae335417b2a86f7bc41db5

  • SHA1

    37bd62f70e66087b0ac7b46fee343f25bde8534d

  • SHA256

    f17e66a90dfa250f34f0d8fe42e57911a348b6adc08b13db3765e2259a051b62

  • SHA512

    ed952bd9c21331a60729fd8b5759fb57a5db56ba02f2db8fe905a3166e88d2b7dbd6cae9a368fd250ba1c3afdc5dfbcb6b46f5983ed011d869ed3c848405207e

  • SSDEEP

    1536:F0vTeZhDyUJZi3RFKfbNjKQauE7+z6WksjD15aE8Te/rC/SZpcAdpiXCsMx+VSFb:qv6ZheLsbN5bEHWko15aROrA6RoM

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7383063637:AAFyD9g219vkZhknsRfJlso3402h_1hs7xE/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Iguduvu.exe
    "C:\Users\Admin\AppData\Local\Temp\Iguduvu.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3048-0-0x00007FFAE0B33000-0x00007FFAE0B35000-memory.dmp

    Filesize

    8KB

  • memory/3048-1-0x0000000000AA0000-0x0000000000AC4000-memory.dmp

    Filesize

    144KB

  • memory/3048-2-0x00007FFAE0B30000-0x00007FFAE15F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3048-4-0x00007FFAE0B30000-0x00007FFAE15F1000-memory.dmp

    Filesize

    10.8MB