Analysis

  • max time kernel
    45s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 23:22

General

  • Target

    Phemedrone Tools.rar

  • Size

    397KB

  • MD5

    712b56f03dc6ab54b9251b5f18d010d4

  • SHA1

    456d47dc33a2178825156614bf212b27ebd60a47

  • SHA256

    e9176cf2b4a8143981cb82cbe6d88bb6f59acab9bc215a20d7fd664004ec0a71

  • SHA512

    2897332330258c11e7582e2c2706aba7d8175b1865d73fc887f48091210f9ed289ddd48378b03b6c8487f9b0c975ee0a1dea648641037f8297873262f09dfd72

  • SSDEEP

    12288:S2hSO3W9O8Rk1al3vyOeKDkFxUr4NGh28b:ykUO8RA83v+KUx5Nob

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Phemedrone Tools.rar"
    1⤵
    • Modifies registry class
    PID:4448
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2156
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:5048
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Phemedrone Tools.rar"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2112
    • C:\Users\Admin\Desktop\Phemedrone Tools\Phemedrone.Tools.exe
      "C:\Users\Admin\Desktop\Phemedrone Tools\Phemedrone.Tools.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\Phemedrone Tools\Phemedrone.Tools.exe

      Filesize

      46KB

      MD5

      a6bf693fe68cd3d8c1e6f15463734193

      SHA1

      84ab3ff2163239fa6701206da4ae8e903060be21

      SHA256

      39ecce4c3f736299577c508670fe23c528b2e9aa076bbfbd3f0fc49ef0e6fb55

      SHA512

      2cb88ca582248ead8f6c839ea377b459453fe559bd2b8ab8cc38043025b8554692f4a6743a92bd67e0301d203c89faac0b28f6d5370a594f7bd4a552cf9f52ea

    • C:\Users\Admin\Desktop\Phemedrone Tools\dnlib.dll

      Filesize

      1.1MB

      MD5

      5cc2bb48b5e8c8ac0b99669401d15456

      SHA1

      02e9ae08f3ec364834eb3ffc122f1c90e1b0e95e

      SHA256

      648950f725fb0320e09c52dcaf81764916df96dc62e7429ba67daea0acb784ea

      SHA512

      2867e94cee9f89f1cf85ad01083d75f4bc0bc0e551b2ffae05581828994f2b01a458ac7a7c94a45e8c40858ecce197f7ec23482ee13ef3f1bf82b33b89b3b420

    • memory/3964-8-0x0000000000E20000-0x0000000000E32000-memory.dmp

      Filesize

      72KB

    • memory/3964-12-0x0000000005830000-0x0000000005954000-memory.dmp

      Filesize

      1.1MB