Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2024 05:16

General

  • Target

    Akodoco.exe

  • Size

    121KB

  • MD5

    1614165de39294aae3ac8ccdad9444e8

  • SHA1

    8eb7625787c4d0e50898affd35e9e1c6455d7c5b

  • SHA256

    794c2c669a30e746be3848eb9ae1a4ba3a1de7c87c338fc2ad4c05d6d84049b8

  • SHA512

    e8f7580af1b0ec5a9605b0ae8f5f38d5667318a5e006a3cb2532e0a8e16e297fca96259872e1c4311891bdf3b5cf129ab0dab9be52c8682b98cbc27b7479a869

  • SSDEEP

    1536:oVcq+cCZgb7M9N0rZrGCOhxgRGQKETLH/b5jLX5NqD/l9HoPgwjzHB+R5ggvT:Q+cC5N0rk92dn7ZX5cjlRo7wR3

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot6394807660:AAE3wwuyqXA763tQqimJu-D2QyZ7BxLhPG0/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Akodoco.exe
    "C:\Users\Admin\AppData\Local\Temp\Akodoco.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4516-1-0x000001D2D5690000-0x000001D2D56B4000-memory.dmp

    Filesize

    144KB

  • memory/4516-0-0x00007FFA09743000-0x00007FFA09745000-memory.dmp

    Filesize

    8KB

  • memory/4516-2-0x00007FFA09740000-0x00007FFA0A201000-memory.dmp

    Filesize

    10.8MB

  • memory/4516-4-0x00007FFA09740000-0x00007FFA0A201000-memory.dmp

    Filesize

    10.8MB