Analysis
-
max time kernel
4294179s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
11-03-2022 14:52
Static task
static1
Behavioral task
behavioral1
Sample
Disbalancer.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Disbalancer.exe
Resource
win10v2004-en-20220113
General
-
Target
Disbalancer.exe
-
Size
5.3MB
-
MD5
876b71d32631eb0980cf48e839566204
-
SHA1
6bf0b1b8a5a55ee7146ade30257c65b04922889c
-
SHA256
eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6
-
SHA512
661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc
Malware Config
Signatures
-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1844 dufosf7HpWmPb1dK.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Disbalancer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Disbalancer.exe -
Loads dropped DLL 1 IoCs
pid Process 1548 Disbalancer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1548-57-0x0000000000DA0000-0x00000000012F2000-memory.dmp themida behavioral1/memory/1548-58-0x0000000000DA0000-0x00000000012F2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Disbalancer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 796 1548 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1844 dufosf7HpWmPb1dK.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1548 Disbalancer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1844 1548 Disbalancer.exe 27 PID 1548 wrote to memory of 1844 1548 Disbalancer.exe 27 PID 1548 wrote to memory of 1844 1548 Disbalancer.exe 27 PID 1548 wrote to memory of 1844 1548 Disbalancer.exe 27 PID 1548 wrote to memory of 796 1548 Disbalancer.exe 28 PID 1548 wrote to memory of 796 1548 Disbalancer.exe 28 PID 1548 wrote to memory of 796 1548 Disbalancer.exe 28 PID 1548 wrote to memory of 796 1548 Disbalancer.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Disbalancer.exe"C:\Users\Admin\AppData\Local\Temp\Disbalancer.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\ProgramData\dufosf7HpWmPb1dK.exe"C:\ProgramData\dufosf7HpWmPb1dK.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 17242⤵
- Program crash
PID:796
-