Analysis

  • max time kernel
    135s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2024 16:33

General

  • Target

    tmpg45mr2xx.exe

  • Size

    137KB

  • MD5

    e27b299c37caf241ff547c4845efb6d6

  • SHA1

    a5b62b4536da6262e18315a44ca5ff7be4dd658f

  • SHA256

    7a2e81375e856c2407907599f401b4a5ec43322bc8e5a4847c43a97f4b91af3f

  • SHA512

    962f94f887b7d6fa95402bc9ef2fbea68deed0a76871e461176e03ad88d07ded383f244095318aa2499543703654825029299b403a16469c1ad635a143d10fcb

  • SSDEEP

    1536:qQfUyJkgcYU/BFI6d75KunrlsCK2Wu01Dy5s5b3x07XSI7UKCWaDCoL3T4NODbio:qQ849/Ud75FnZtCDyK5Tm7iIFCzPi0F

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7580542331:AAGHf6T43IrCaf5fPcI73jO_S0Bs8H-8Nig/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmpg45mr2xx.exe
    "C:\Users\Admin\AppData\Local\Temp\tmpg45mr2xx.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-0-0x00007FFA7BF23000-0x00007FFA7BF25000-memory.dmp

    Filesize

    8KB

  • memory/1648-1-0x0000000000A50000-0x0000000000A78000-memory.dmp

    Filesize

    160KB

  • memory/1648-2-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1648-4-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB