Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 10:57

General

  • Target

    Umovelo2.exe

  • Size

    115KB

  • MD5

    4b505f9c0da945d7505ed40f2d0eb8ae

  • SHA1

    1e49a3f17ff2b4f5c5705a421ac94fda0cde348f

  • SHA256

    1dec93d447770aa7636ea8d8e553b68f28b31ba3d34b8024deed5de7b3d82a27

  • SHA512

    50e015ef7073318e277bf0f8448513cd624bd64fe5fa17d31b127cf1d0ca75a9e6774c4dfe89b9bdea01d0d8cb6dd94c1279e23f7d371c1cf72813b69b4ac8ec

  • SSDEEP

    1536:aw8VfG5Pq8rGZo3RVFdgMVk0fdUPLxcAgOgoCJ176IQNgm53YZBjdIvZmqUNDWi4:3aGRqKToMRdaCJ1OIG5GBjd+aNDHlo

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7977811634:AAEsOS7wUXOBwdgGyVbVwwqu3kCcteKHzoA/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Umovelo2.exe
    "C:\Users\Admin\AppData\Local\Temp\Umovelo2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4812-0-0x00007FF8F0FD3000-0x00007FF8F0FD5000-memory.dmp

    Filesize

    8KB

  • memory/4812-1-0x0000000000E60000-0x0000000000E84000-memory.dmp

    Filesize

    144KB

  • memory/4812-2-0x00007FF8F0FD0000-0x00007FF8F1A91000-memory.dmp

    Filesize

    10.8MB

  • memory/4812-3-0x00007FF8F0FD3000-0x00007FF8F0FD5000-memory.dmp

    Filesize

    8KB

  • memory/4812-4-0x00007FF8F0FD0000-0x00007FF8F1A91000-memory.dmp

    Filesize

    10.8MB