Analysis

  • max time kernel
    128s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 00:27

General

  • Target

    5e7933363278d988f02e1ed988262195d83090202118870a79805d8c4463385a.exe

  • Size

    115KB

  • MD5

    ca9edfffa9bacb007cd17fe4be5fff4f

  • SHA1

    375dcd6b35b104017bdcbf2e1e54f7819ffe7945

  • SHA256

    5e7933363278d988f02e1ed988262195d83090202118870a79805d8c4463385a

  • SHA512

    6af1140955ee7c92b1344f3d9a68e825cec54af691bc5a01984a5d62eb6a4eba10dfe5db1860a2fe037be48a3a09f004b082ddb0608e54407a51231fa518da61

  • SSDEEP

    1536:IByvtXMLiZV3RXYmDoQu6Kc917750QQ69c6kCs4io6yc1oXPItYx1OpsoScWh+7/:AEtX/VRDoQzKq775DQ6u4I21A

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7939754852:AAFIvtIYgqhJR7MldVWlBpD2jOfic44MJBs/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e7933363278d988f02e1ed988262195d83090202118870a79805d8c4463385a.exe
    "C:\Users\Admin\AppData\Local\Temp\5e7933363278d988f02e1ed988262195d83090202118870a79805d8c4463385a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4360-0-0x00007FFF25C83000-0x00007FFF25C85000-memory.dmp

    Filesize

    8KB

  • memory/4360-1-0x0000000000250000-0x0000000000274000-memory.dmp

    Filesize

    144KB

  • memory/4360-2-0x00007FFF25C80000-0x00007FFF26741000-memory.dmp

    Filesize

    10.8MB

  • memory/4360-4-0x00007FFF25C80000-0x00007FFF26741000-memory.dmp

    Filesize

    10.8MB