Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 19:10 UTC

General

  • Target

    83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe

  • Size

    138KB

  • MD5

    19b81d33f51a88184418ea44457a9d60

  • SHA1

    c60d106c7fe0441510933c4885e4d9f514463f00

  • SHA256

    83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33e

  • SHA512

    0f08345084a8a01f6e3d913683fd60ed8c7c4698b2cc43fc836650b16813f0b851241ebbebdf0e955f71701b9f84633f46d12e178e8dea82021e8821afaa71fb

  • SSDEEP

    3072:R28SrpYJw+qQdgM3/Q8Ey5ERYKUVsgVWvgpx:n1mQdf3/Q5GKUVpV

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7416805555:AAH0Tesujlq6rLfW6UQv3aidMS7QEFHsZJU/sendDocument

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
    "C:\Users\Admin\AppData\Local\Temp\83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2396 -s 824
      2⤵
        PID:2624

    Network

    • flag-us
      DNS
      get.geojs.io
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      Remote address:
      8.8.8.8:53
      Request
      get.geojs.io
      IN A
      Response
      get.geojs.io
      IN A
      172.67.70.233
      get.geojs.io
      IN A
      104.26.1.100
      get.geojs.io
      IN A
      104.26.0.100
    • flag-us
      GET
      https://get.geojs.io/v1/ip/geo.json
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      Remote address:
      172.67.70.233:443
      Request
      GET /v1/ip/geo.json HTTP/1.1
      Host: get.geojs.io
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Fri, 04 Oct 2024 19:10:24 GMT
      Content-Type: application/json
      Transfer-Encoding: chunked
      Connection: keep-alive
      x-request-id: 22bd74d62f69f784bdeafd2783e8a6fe-ASH
      strict-transport-security: max-age=15552000; includeSubDomains; preload
      access-control-allow-origin: *
      access-control-allow-methods: GET
      pragma: no-cache
      Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
      geojs-backend: ash-01
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J5TEOGGjRw%2BT5ECxEh508clyi0yMFdqIxa9CpeQtfu47seLUnuMJ6GRFFHAed9aFCcU%2FutIrRDeKgx8x5Vo2hZ5vV98gURxbBFQLbVrZT%2FM4ROq0uxPRXQvLr8RNHQ%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      X-Content-Type-Options: nosniff
      Server: cloudflare
      CF-RAY: 8cd778cb6e03634c-LHR
    • flag-us
      DNS
      api.telegram.org
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      Remote address:
      8.8.8.8:53
      Request
      api.telegram.org
      IN A
      Response
      api.telegram.org
      IN A
      149.154.167.220
    • 172.67.70.233:443
      https://get.geojs.io/v1/ip/geo.json
      tls, http
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      769 B
      6.2kB
      9
      10

      HTTP Request

      GET https://get.geojs.io/v1/ip/geo.json

      HTTP Response

      200
    • 149.154.167.220:443
      api.telegram.org
      tls
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      388 B
      219 B
      5
      5
    • 8.8.8.8:53
      get.geojs.io
      dns
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      58 B
      106 B
      1
      1

      DNS Request

      get.geojs.io

      DNS Response

      172.67.70.233
      104.26.1.100
      104.26.0.100

    • 8.8.8.8:53
      api.telegram.org
      dns
      83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
      62 B
      78 B
      1
      1

      DNS Request

      api.telegram.org

      DNS Response

      149.154.167.220

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2396-0-0x000007FEF5E43000-0x000007FEF5E44000-memory.dmp

      Filesize

      4KB

    • memory/2396-1-0x0000000000F70000-0x0000000000F98000-memory.dmp

      Filesize

      160KB

    • memory/2396-2-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp

      Filesize

      9.9MB

    • memory/2396-3-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp

      Filesize

      9.9MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.