Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    17-01-2022 06:42

General

  • Target

    6a571c4f162b1cd1c46abf16add0c1c1.exe

  • Size

    4.1MB

  • MD5

    6a571c4f162b1cd1c46abf16add0c1c1

  • SHA1

    4ff32013415028c03f5687535f3d144623c1e081

  • SHA256

    3ec3d7b4b3eeae490ae2f97ac7d52c0bec674384225d26a68d7b89ec84c60eaa

  • SHA512

    97e387cd027ad83ae90fe016bbdd246195e566ad4b0764015751277ca39906ba17648b2a2e9943015f00b58b0c5610ff636a8b065e8d452f993cf61b46f999b9

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a571c4f162b1cd1c46abf16add0c1c1.exe
    "C:\Users\Admin\AppData\Local\Temp\6a571c4f162b1cd1c46abf16add0c1c1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\lll.vbs"
      2⤵
      • Blocklisted process makes network request
      PID:1792
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\321.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\321.exe"
      2⤵
      • Executes dropped EXE
      PID:1468
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:1696
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\c.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\c.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:108

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/108-99-0x000000001B090000-0x000000001B092000-memory.dmp

      Filesize

      8KB

    • memory/108-98-0x000007FEF6740000-0x000007FEF686C000-memory.dmp

      Filesize

      1.2MB

    • memory/108-96-0x00000000012F0000-0x0000000001356000-memory.dmp

      Filesize

      408KB

    • memory/108-95-0x00000000012F0000-0x0000000001356000-memory.dmp

      Filesize

      408KB

    • memory/740-55-0x00000000763B1000-0x00000000763B3000-memory.dmp

      Filesize

      8KB

    • memory/1468-73-0x0000000000360000-0x00000000003C0000-memory.dmp

      Filesize

      384KB

    • memory/1512-75-0x0000000004D45000-0x0000000004D56000-memory.dmp

      Filesize

      68KB

    • memory/1512-71-0x0000000000CA0000-0x0000000000CDE000-memory.dmp

      Filesize

      248KB

    • memory/1512-72-0x0000000000CA0000-0x0000000000CDE000-memory.dmp

      Filesize

      248KB

    • memory/1512-74-0x0000000004D40000-0x0000000004D41000-memory.dmp

      Filesize

      4KB

    • memory/1512-76-0x00000000006B0000-0x00000000006DC000-memory.dmp

      Filesize

      176KB

    • memory/1696-81-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-86-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-79-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-80-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-94-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-83-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-82-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-78-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1696-77-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB