Analysis
-
max time kernel
45s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 23:22
Behavioral task
behavioral1
Sample
Phemedrone Tools.rar
Resource
win10v2004-20240709-en
General
-
Target
Phemedrone Tools.rar
-
Size
397KB
-
MD5
712b56f03dc6ab54b9251b5f18d010d4
-
SHA1
456d47dc33a2178825156614bf212b27ebd60a47
-
SHA256
e9176cf2b4a8143981cb82cbe6d88bb6f59acab9bc215a20d7fd664004ec0a71
-
SHA512
2897332330258c11e7582e2c2706aba7d8175b1865d73fc887f48091210f9ed289ddd48378b03b6c8487f9b0c975ee0a1dea648641037f8297873262f09dfd72
-
SSDEEP
12288:S2hSO3W9O8Rk1al3vyOeKDkFxUr4NGh28b:ykUO8RA83v+KUx5Nob
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Phemedrone.Tools.exepid process 3964 Phemedrone.Tools.exe -
Loads dropped DLL 2 IoCs
Processes:
Phemedrone.Tools.exepid process 3964 Phemedrone.Tools.exe 3964 Phemedrone.Tools.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Phemedrone.Tools.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phemedrone.Tools.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2112 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2112 7zFM.exe Token: 35 2112 7zFM.exe Token: SeSecurityPrivilege 2112 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 2112 7zFM.exe 2112 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2156 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Phemedrone Tools.rar"1⤵
- Modifies registry class
PID:4448
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2156
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5048
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Phemedrone Tools.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2112
-
C:\Users\Admin\Desktop\Phemedrone Tools\Phemedrone.Tools.exe"C:\Users\Admin\Desktop\Phemedrone Tools\Phemedrone.Tools.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5a6bf693fe68cd3d8c1e6f15463734193
SHA184ab3ff2163239fa6701206da4ae8e903060be21
SHA25639ecce4c3f736299577c508670fe23c528b2e9aa076bbfbd3f0fc49ef0e6fb55
SHA5122cb88ca582248ead8f6c839ea377b459453fe559bd2b8ab8cc38043025b8554692f4a6743a92bd67e0301d203c89faac0b28f6d5370a594f7bd4a552cf9f52ea
-
Filesize
1.1MB
MD55cc2bb48b5e8c8ac0b99669401d15456
SHA102e9ae08f3ec364834eb3ffc122f1c90e1b0e95e
SHA256648950f725fb0320e09c52dcaf81764916df96dc62e7429ba67daea0acb784ea
SHA5122867e94cee9f89f1cf85ad01083d75f4bc0bc0e551b2ffae05581828994f2b01a458ac7a7c94a45e8c40858ecce197f7ec23482ee13ef3f1bf82b33b89b3b420