Analysis

  • max time kernel
    4294179s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    11-03-2022 14:52

General

  • Target

    Disbalancer.exe

  • Size

    5.3MB

  • MD5

    876b71d32631eb0980cf48e839566204

  • SHA1

    6bf0b1b8a5a55ee7146ade30257c65b04922889c

  • SHA256

    eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6

  • SHA512

    661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Disbalancer.exe
    "C:\Users\Admin\AppData\Local\Temp\Disbalancer.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\ProgramData\dufosf7HpWmPb1dK.exe
      "C:\ProgramData\dufosf7HpWmPb1dK.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 1724
      2⤵
      • Program crash
      PID:796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\dufosf7HpWmPb1dK.exe

    MD5

    bc31f6c304ba6ac92fc203ef0cb4c243

    SHA1

    abc7850eb46fb1252f48e43d23eebd2a957d95e9

    SHA256

    23b9ed8a00a10c4e0d84ab75882ef6fe02b24368b348653ac586b6f05497e01f

    SHA512

    708314a64cf734962b51932c432143eb87f3bf0e97528252543feb6cbca213d24cc4522caa69a71b1e8319e85dae1e9b3bc1a0148d20c55d8a1109f86dfcb0ad

  • \ProgramData\dufosf7HpWmPb1dK.exe

    MD5

    bc31f6c304ba6ac92fc203ef0cb4c243

    SHA1

    abc7850eb46fb1252f48e43d23eebd2a957d95e9

    SHA256

    23b9ed8a00a10c4e0d84ab75882ef6fe02b24368b348653ac586b6f05497e01f

    SHA512

    708314a64cf734962b51932c432143eb87f3bf0e97528252543feb6cbca213d24cc4522caa69a71b1e8319e85dae1e9b3bc1a0148d20c55d8a1109f86dfcb0ad

  • memory/1548-54-0x0000000075611000-0x0000000075613000-memory.dmp

    Filesize

    8KB

  • memory/1548-57-0x0000000000DA0000-0x00000000012F2000-memory.dmp

    Filesize

    5.3MB

  • memory/1548-58-0x0000000000DA0000-0x00000000012F2000-memory.dmp

    Filesize

    5.3MB

  • memory/1548-59-0x00000000766F0000-0x0000000076800000-memory.dmp

    Filesize

    1.1MB

  • memory/1548-60-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/1548-61-0x0000000074040000-0x000000007472E000-memory.dmp

    Filesize

    6.9MB

  • memory/1548-62-0x0000000004970000-0x0000000004971000-memory.dmp

    Filesize

    4KB