Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 01:32
Behavioral task
behavioral1
Sample
b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe
Resource
win10v2004-20240802-en
General
-
Target
b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe
-
Size
115KB
-
MD5
3147cdd98b93d9517419dab0bb319955
-
SHA1
7a8dd45bff153b572192ac3769a8e4d55c92bfca
-
SHA256
b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55
-
SHA512
e6ee3545d1ed4e58d33806e150e78391983a97c36e302b219656196f0666aed20df184d02efda4ffa72b08ae56749e84b5cff9a02955c28d62d917c50686961c
-
SSDEEP
3072:fSXbCQflsSclnFtYbZ/MGOu5us9cSDYRw1Vk:zcgjYbZ/MpLzY1V
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot5394241541:AAHJzSGiYRn25-qKamWj7biroYFdz9W0a4k/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exedescription pid process Token: SeDebugPrivilege 2732 b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exedescription pid process target process PID 2732 wrote to memory of 2588 2732 b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe WerFault.exe PID 2732 wrote to memory of 2588 2732 b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe WerFault.exe PID 2732 wrote to memory of 2588 2732 b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe"C:\Users\Admin\AppData\Local\Temp\b2fe98d4ac3d137587b4cd0521cd28a695adb40872b1e6e5619a735ae2974e55.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2732 -s 6922⤵PID:2588
-