Analysis
-
max time kernel
131s -
max time network
155s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-05-2021 14:04
Static task
static1
Behavioral task
behavioral1
Sample
54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe
-
Size
159KB
-
MD5
ff51be7345fd3ec5cc78e733239335a8
-
SHA1
8903d63999d01fcb3f9ea42493324af669ae6a04
-
SHA256
54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4
-
SHA512
d15823b254aced0325516188f33b6564d43d5e8331fbf08a6da034738d32bc114da44049dad66a4d44289e8791fb69d73e71471768b756f42df3a6b069826ee4
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
phoenixbit.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat phoenixbit.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 phoenixbit.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE phoenixbit.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies phoenixbit.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 phoenixbit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
phoenixbit.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix phoenixbit.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" phoenixbit.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" phoenixbit.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
phoenixbit.exepid process 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe 2584 phoenixbit.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exepid process 3860 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exephoenixbit.exedescription pid process target process PID 644 wrote to memory of 3860 644 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe PID 644 wrote to memory of 3860 644 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe PID 644 wrote to memory of 3860 644 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe 54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe PID 1252 wrote to memory of 2584 1252 phoenixbit.exe phoenixbit.exe PID 1252 wrote to memory of 2584 1252 phoenixbit.exe phoenixbit.exe PID 1252 wrote to memory of 2584 1252 phoenixbit.exe phoenixbit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe"C:\Users\Admin\AppData\Local\Temp\54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\54dba7de43a2863d3a091d312d987915622068a027bd07ce63288083352902a4.exe--e3dcd2652⤵
- Suspicious behavior: RenamesItself
PID:3860
-
-
C:\Windows\SysWOW64\phoenixbit.exe"C:\Windows\SysWOW64\phoenixbit.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\phoenixbit.exe--314497702⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2584
-