Analysis
-
max time kernel
24s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 02:54
Behavioral task
behavioral1
Sample
552708c436696f90f45a1e37db90ea90N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
552708c436696f90f45a1e37db90ea90N.exe
Resource
win10v2004-20240730-en
General
-
Target
552708c436696f90f45a1e37db90ea90N.exe
-
Size
116KB
-
MD5
552708c436696f90f45a1e37db90ea90
-
SHA1
4470d1182f2587a1f9cd974e712929660234fff1
-
SHA256
24363ff2948bd9a78635471498e899306edfff82ab96d1b977a564ef2eae5b41
-
SHA512
116408995058a015137aeec14490468470dd241175b917ef16b63ab1b324e265d26db221693b4b858e43b67a57084383b0bbebe245a3ff8391aef24b57c63e85
-
SSDEEP
1536:7QEQ6Or1v0eEW32jrMP+Uo8ZPp+8y6OG60Ee5K3QC/xxx3pZzHNoriwoQAhL8j:ErnhBagZQ8HOSEe5rC/xxnZztwj
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7206720228:AAEBZdduavQnTtKEU_zzcbsBpsX39gH7twg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
552708c436696f90f45a1e37db90ea90N.exepid process 2716 552708c436696f90f45a1e37db90ea90N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
552708c436696f90f45a1e37db90ea90N.exedescription pid process Token: SeDebugPrivilege 2716 552708c436696f90f45a1e37db90ea90N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
552708c436696f90f45a1e37db90ea90N.exedescription pid process target process PID 2716 wrote to memory of 2868 2716 552708c436696f90f45a1e37db90ea90N.exe WerFault.exe PID 2716 wrote to memory of 2868 2716 552708c436696f90f45a1e37db90ea90N.exe WerFault.exe PID 2716 wrote to memory of 2868 2716 552708c436696f90f45a1e37db90ea90N.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\552708c436696f90f45a1e37db90ea90N.exe"C:\Users\Admin\AppData\Local\Temp\552708c436696f90f45a1e37db90ea90N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2716 -s 15882⤵PID:2868
-