Analysis

  • max time kernel
    94s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 19:10

General

  • Target

    83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe

  • Size

    138KB

  • MD5

    19b81d33f51a88184418ea44457a9d60

  • SHA1

    c60d106c7fe0441510933c4885e4d9f514463f00

  • SHA256

    83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33e

  • SHA512

    0f08345084a8a01f6e3d913683fd60ed8c7c4698b2cc43fc836650b16813f0b851241ebbebdf0e955f71701b9f84633f46d12e178e8dea82021e8821afaa71fb

  • SSDEEP

    3072:R28SrpYJw+qQdgM3/Q8Ey5ERYKUVsgVWvgpx:n1mQdf3/Q5GKUVpV

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7416805555:AAH0Tesujlq6rLfW6UQv3aidMS7QEFHsZJU/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe
    "C:\Users\Admin\AppData\Local\Temp\83937f232fb4ed220ffe996f17016132d39d5d1b15cf039338871a641439d33eN.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4196-0-0x00007FFB51DC3000-0x00007FFB51DC5000-memory.dmp

    Filesize

    8KB

  • memory/4196-1-0x0000000000170000-0x0000000000198000-memory.dmp

    Filesize

    160KB

  • memory/4196-2-0x00007FFB51DC0000-0x00007FFB52881000-memory.dmp

    Filesize

    10.8MB

  • memory/4196-4-0x00007FFB51DC0000-0x00007FFB52881000-memory.dmp

    Filesize

    10.8MB