Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 10:13
Behavioral task
behavioral1
Sample
system.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
system.exe
Resource
win10v2004-20240709-en
General
-
Target
system.exe
-
Size
102KB
-
MD5
bc52090b0338fdbe75317db064edadd2
-
SHA1
c6e5bcb853ef23762eb70c4867d99b7315a24f69
-
SHA256
f75d8facbade534b3c1018adceb57edf8d340459d81601d9a47dcbcb18b313cf
-
SHA512
bb9b4af620dfa4659c0a0de5c7391434e11370bae078c5ed07c0f8760eaf9bc0ced1ec9d4f9a8ed608750f5db8a05045a0a24f50bc74ab39f53de09d1ff35bfd
-
SSDEEP
3072:X1y3CkjNR6+ueZ04+cZ5Q5yZ53wEKnux:sSkj36+u94W5EK
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7329972286:AAEOM1j7YMzqyniSmjEDT3zUq-fyt1rbFgA/sendMessage?chat_id=6732975817
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
system.exedescription pid process Token: SeDebugPrivilege 840 system.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
system.exedescription pid process target process PID 840 wrote to memory of 2088 840 system.exe WerFault.exe PID 840 wrote to memory of 2088 840 system.exe WerFault.exe PID 840 wrote to memory of 2088 840 system.exe WerFault.exe