Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:16
Behavioral task
behavioral1
Sample
system.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
system.exe
Resource
win10v2004-20240704-en
General
-
Target
system.exe
-
Size
101KB
-
MD5
fd01a9e88fd110df94b51349094242aa
-
SHA1
1c944a8d1b7dab69a493b90c4f1a8a24030125e7
-
SHA256
e2eec42a3c7c489d74b158e1fef336fe1a9d2c7e2ea67a4c6e6a724ffac9b1eb
-
SHA512
cfe1ca1cef527a09ce8aece7fd92af29ef956ac2fa8869f88075b3b248681d23f5c99a27a49b40a90f86c150f8b6e297ea68c230700bcc22164498fdd262d2d5
-
SSDEEP
3072:ms/j1ruFB/AYhC0VYY9s9O0hWUyUtV5c5JrK3wEK9ucZ:cHBMM7fREKD
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot6861530662:AAFueJRxaIZGz_oVT2-CVuuL9N0MRsh-5_Y/sendMessage?chat_id=-4275222483
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
system.exedescription pid process Token: SeDebugPrivilege 2464 system.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
system.exedescription pid process target process PID 2464 wrote to memory of 2828 2464 system.exe WerFault.exe PID 2464 wrote to memory of 2828 2464 system.exe WerFault.exe PID 2464 wrote to memory of 2828 2464 system.exe WerFault.exe