Analysis

  • max time kernel
    80s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 14:23

General

  • Target

    jailbreak 2.exe

  • Size

    115KB

  • MD5

    4b505f9c0da945d7505ed40f2d0eb8ae

  • SHA1

    1e49a3f17ff2b4f5c5705a421ac94fda0cde348f

  • SHA256

    1dec93d447770aa7636ea8d8e553b68f28b31ba3d34b8024deed5de7b3d82a27

  • SHA512

    50e015ef7073318e277bf0f8448513cd624bd64fe5fa17d31b127cf1d0ca75a9e6774c4dfe89b9bdea01d0d8cb6dd94c1279e23f7d371c1cf72813b69b4ac8ec

  • SSDEEP

    1536:aw8VfG5Pq8rGZo3RVFdgMVk0fdUPLxcAgOgoCJ176IQNgm53YZBjdIvZmqUNDWi4:3aGRqKToMRdaCJ1OIG5GBjd+aNDHlo

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7977811634:AAEsOS7wUXOBwdgGyVbVwwqu3kCcteKHzoA/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\jailbreak 2.exe
    "C:\Users\Admin\AppData\Local\Temp\jailbreak 2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3836-0-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

    Filesize

    8KB

  • memory/3836-1-0x0000000000C10000-0x0000000000C34000-memory.dmp

    Filesize

    144KB

  • memory/3836-2-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3836-3-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

    Filesize

    10.8MB