Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 11:56
Behavioral task
behavioral1
Sample
drop3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
drop3.exe
Resource
win10v2004-20241007-en
General
-
Target
drop3.exe
-
Size
138KB
-
MD5
71b454fd9a0f880e9638d7536dd2e8f8
-
SHA1
419aed8771f92d703e0336172d77cc51b3a03a48
-
SHA256
581618e83b12fba97bdf117c1431a73c7c938e0ebfb9a12e8533a33bb9462b50
-
SHA512
92fa6aa2bb0434ae905d1fa758439dd527c3ab652897f965a408ea056753770bf3b27fbf347ada35592fd5c9997757469ddb96aefc1b68dc7be950ade56c5431
-
SSDEEP
3072:hGyxO6HAjmjaa8OP/HGIssMATKIBn57N8Agq:NOeAija0/lMATzBju
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7356729349:AAGYccwnhlcwqPllDJyVvJvZ35gbTxqyoOs/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2092 drop3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2092 drop3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2684 2092 drop3.exe 32 PID 2092 wrote to memory of 2684 2092 drop3.exe 32 PID 2092 wrote to memory of 2684 2092 drop3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\drop3.exe"C:\Users\Admin\AppData\Local\Temp\drop3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2092 -s 8362⤵PID:2684
-