Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 17:11
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe
-
Size
1.1MB
-
MD5
37c5e2de42bc44f855e4316f85b5ed8d
-
SHA1
a8743e31caac1fbb101646d43f9ce7d5479567ad
-
SHA256
7d955bb75c0eb8d8c50d911cfb6320df0c7af260d16522c71b5a8e8f52d121c4
-
SHA512
5a3a37ef1c204c8a55d324f6fe96a949f685aa28d11b64c949710369a9ed31d380422a6922eca8c71002922f6e1417996b33fa39d66cd6c9484f66408697a81f
-
SSDEEP
24576:Eec44mam9NMNfs5KpQnBOeC+aMQNo/80:Z4hmq05KpQnB++CWr
Malware Config
Extracted
phemedrone
195.20.18.146:8080
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 1644 1764 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1764 jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1764 jsc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1224 wrote to memory of 1764 1224 2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe 31 PID 1764 wrote to memory of 1644 1764 jsc.exe 33 PID 1764 wrote to memory of 1644 1764 jsc.exe 33 PID 1764 wrote to memory of 1644 1764 jsc.exe 33 PID 1764 wrote to memory of 1644 1764 jsc.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-02_37c5e2de42bc44f855e4316f85b5ed8d_cobalt-strike_ryuk.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 7683⤵
- Program crash
PID:1644
-
-