Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 02:54
Behavioral task
behavioral1
Sample
552708c436696f90f45a1e37db90ea90N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
552708c436696f90f45a1e37db90ea90N.exe
Resource
win10v2004-20240730-en
General
-
Target
552708c436696f90f45a1e37db90ea90N.exe
-
Size
116KB
-
MD5
552708c436696f90f45a1e37db90ea90
-
SHA1
4470d1182f2587a1f9cd974e712929660234fff1
-
SHA256
24363ff2948bd9a78635471498e899306edfff82ab96d1b977a564ef2eae5b41
-
SHA512
116408995058a015137aeec14490468470dd241175b917ef16b63ab1b324e265d26db221693b4b858e43b67a57084383b0bbebe245a3ff8391aef24b57c63e85
-
SSDEEP
1536:7QEQ6Or1v0eEW32jrMP+Uo8ZPp+8y6OG60Ee5K3QC/xxx3pZzHNoriwoQAhL8j:ErnhBagZQ8HOSEe5rC/xxnZztwj
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7206720228:AAEBZdduavQnTtKEU_zzcbsBpsX39gH7twg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
552708c436696f90f45a1e37db90ea90N.exepid process 2184 552708c436696f90f45a1e37db90ea90N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
552708c436696f90f45a1e37db90ea90N.exedescription pid process Token: SeDebugPrivilege 2184 552708c436696f90f45a1e37db90ea90N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2184-0-0x00007FFF82A83000-0x00007FFF82A85000-memory.dmpFilesize
8KB
-
memory/2184-1-0x00000162A1080000-0x00000162A10A4000-memory.dmpFilesize
144KB
-
memory/2184-2-0x00007FFF82A80000-0x00007FFF83541000-memory.dmpFilesize
10.8MB
-
memory/2184-4-0x00007FFF82A80000-0x00007FFF83541000-memory.dmpFilesize
10.8MB