Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 10:57

General

  • Target

    Umovelo2.exe

  • Size

    115KB

  • MD5

    4b505f9c0da945d7505ed40f2d0eb8ae

  • SHA1

    1e49a3f17ff2b4f5c5705a421ac94fda0cde348f

  • SHA256

    1dec93d447770aa7636ea8d8e553b68f28b31ba3d34b8024deed5de7b3d82a27

  • SHA512

    50e015ef7073318e277bf0f8448513cd624bd64fe5fa17d31b127cf1d0ca75a9e6774c4dfe89b9bdea01d0d8cb6dd94c1279e23f7d371c1cf72813b69b4ac8ec

  • SSDEEP

    1536:aw8VfG5Pq8rGZo3RVFdgMVk0fdUPLxcAgOgoCJ176IQNgm53YZBjdIvZmqUNDWi4:3aGRqKToMRdaCJ1OIG5GBjd+aNDHlo

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7977811634:AAEsOS7wUXOBwdgGyVbVwwqu3kCcteKHzoA/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Umovelo2.exe
    "C:\Users\Admin\AppData\Local\Temp\Umovelo2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1104 -s 1616
      2⤵
        PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1104-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

      Filesize

      4KB

    • memory/1104-1-0x0000000000180000-0x00000000001A4000-memory.dmp

      Filesize

      144KB

    • memory/1104-2-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

      Filesize

      9.9MB

    • memory/1104-3-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

      Filesize

      4KB

    • memory/1104-4-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

      Filesize

      9.9MB

    • memory/1104-5-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

      Filesize

      9.9MB