Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17-01-2022 06:42
Static task
static1
Behavioral task
behavioral1
Sample
6a571c4f162b1cd1c46abf16add0c1c1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6a571c4f162b1cd1c46abf16add0c1c1.exe
Resource
win10v2004-en-20220113
General
-
Target
6a571c4f162b1cd1c46abf16add0c1c1.exe
-
Size
4.1MB
-
MD5
6a571c4f162b1cd1c46abf16add0c1c1
-
SHA1
4ff32013415028c03f5687535f3d144623c1e081
-
SHA256
3ec3d7b4b3eeae490ae2f97ac7d52c0bec674384225d26a68d7b89ec84c60eaa
-
SHA512
97e387cd027ad83ae90fe016bbdd246195e566ad4b0764015751277ca39906ba17648b2a2e9943015f00b58b0c5610ff636a8b065e8d452f993cf61b46f999b9
Malware Config
Signatures
-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1792 WScript.exe 4 1792 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1468 321.exe 1512 123.exe 108 c.exe -
Loads dropped DLL 12 IoCs
pid Process 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 108 c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 1696 1512 123.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1512 123.exe Token: SeDebugPrivilege 108 c.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 740 wrote to memory of 1792 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 27 PID 740 wrote to memory of 1792 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 27 PID 740 wrote to memory of 1792 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 27 PID 740 wrote to memory of 1792 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 27 PID 740 wrote to memory of 1468 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 28 PID 740 wrote to memory of 1468 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 28 PID 740 wrote to memory of 1468 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 28 PID 740 wrote to memory of 1468 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 28 PID 740 wrote to memory of 1512 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 29 PID 740 wrote to memory of 1512 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 29 PID 740 wrote to memory of 1512 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 29 PID 740 wrote to memory of 1512 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 29 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 1512 wrote to memory of 1696 1512 123.exe 30 PID 740 wrote to memory of 108 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 31 PID 740 wrote to memory of 108 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 31 PID 740 wrote to memory of 108 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 31 PID 740 wrote to memory of 108 740 6a571c4f162b1cd1c46abf16add0c1c1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a571c4f162b1cd1c46abf16add0c1c1.exe"C:\Users\Admin\AppData\Local\Temp\6a571c4f162b1cd1c46abf16add0c1c1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\lll.vbs"2⤵
- Blocklisted process makes network request
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\321.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\321.exe"2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\c.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:108
-