Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 15:34

General

  • Target

    Bupyges.exe

  • Size

    116KB

  • MD5

    7ff72aafd4c957f58521c2cd3b69c811

  • SHA1

    85755b0d563450c987ddf3bc006bcf48ee27b961

  • SHA256

    9efce9aeeb96e202c9155617a7208a6566511b58a46534d1c9bb12275175dd8a

  • SHA512

    7aa3f52c02e13a1a69697bbdfaf1b288adb42205ecdeaf72535aeb0e245f7aaa5fd68a9cb7fe57ed346ba3c95cf99b6be328255bc0a8522325e1b1625bd4b6db

  • SSDEEP

    3072:jPFASpM5tNCtxaOSdYxa5zAvMdead8+BVK7RHaJbW:TFvpMd6aOSdYxoAEYad8+nK7RHaJb

Malware Config

Extracted

Family

phemedrone

C2

127.0.0.1:22222

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bupyges.exe
    "C:\Users\Admin\AppData\Local\Temp\Bupyges.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2700 -s 500
      2⤵
        PID:2540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2700-0-0x000007FEF5873000-0x000007FEF5874000-memory.dmp

      Filesize

      4KB

    • memory/2700-1-0x00000000003C0000-0x00000000003E4000-memory.dmp

      Filesize

      144KB

    • memory/2700-2-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB

    • memory/2700-3-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB