Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 17:05
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe
-
Size
1.1MB
-
MD5
37c5e2de42bc44f855e4316f85b5ed8d
-
SHA1
a8743e31caac1fbb101646d43f9ce7d5479567ad
-
SHA256
7d955bb75c0eb8d8c50d911cfb6320df0c7af260d16522c71b5a8e8f52d121c4
-
SHA512
5a3a37ef1c204c8a55d324f6fe96a949f685aa28d11b64c949710369a9ed31d380422a6922eca8c71002922f6e1417996b33fa39d66cd6c9484f66408697a81f
-
SSDEEP
24576:Eec44mam9NMNfs5KpQnBOeC+aMQNo/80:Z4hmq05KpQnB++CWr
Malware Config
Extracted
phemedrone
195.20.18.146:8080
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2448 2320 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 jsc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 1268 wrote to memory of 2320 1268 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 29 PID 2320 wrote to memory of 2448 2320 jsc.exe 31 PID 2320 wrote to memory of 2448 2320 jsc.exe 31 PID 2320 wrote to memory of 2448 2320 jsc.exe 31 PID 2320 wrote to memory of 2448 2320 jsc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 7763⤵
- Program crash
PID:2448
-
-