Analysis
-
max time kernel
26s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:27
Behavioral task
behavioral1
Sample
Alozyry.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Alozyry.exe
Resource
win10v2004-20240704-en
General
-
Target
Alozyry.exe
-
Size
111KB
-
MD5
6c2c7ef5b5716d674991e364750ff233
-
SHA1
abce149b0532326458909c21e6e13063a92f3251
-
SHA256
ad9c3a743ab48629ef8b02e26c82cb0f497669d8ae3b236758f997f695e78c73
-
SHA512
cf673f324030bb23bfce9e09d3c8d10ceb108fb962557a141f1200d31e89ec4e4c1654d3d6c0657eb38ba4942ab0cc6a7bfffd6159c8d989214c6b94350113ea
-
SSDEEP
1536:L66Cxsr7any9okBEO623Dnii5/u/TMhDLLUfmK5eR+2yMV:Qx6any1EO623/5G/Q1LQmK5eRFt
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot6861530662:AAFueJRxaIZGz_oVT2-CVuuL9N0MRsh-5_Y/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Alozyry.exepid process 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe 3024 Alozyry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Alozyry.exedescription pid process Token: SeDebugPrivilege 3024 Alozyry.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Alozyry.exedescription pid process target process PID 3024 wrote to memory of 2608 3024 Alozyry.exe WerFault.exe PID 3024 wrote to memory of 2608 3024 Alozyry.exe WerFault.exe PID 3024 wrote to memory of 2608 3024 Alozyry.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Alozyry.exe"C:\Users\Admin\AppData\Local\Temp\Alozyry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3024 -s 17162⤵PID:2608
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2768