Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-03-2022 14:52

General

  • Target

    Disbalancer.exe

  • Size

    5.3MB

  • MD5

    876b71d32631eb0980cf48e839566204

  • SHA1

    6bf0b1b8a5a55ee7146ade30257c65b04922889c

  • SHA256

    eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6

  • SHA512

    661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Disbalancer.exe
    "C:\Users\Admin\AppData\Local\Temp\Disbalancer.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\ProgramData\dufosf7HpWmPb1dK.exe
      "C:\ProgramData\dufosf7HpWmPb1dK.exe"
      2⤵
      • Executes dropped EXE
      PID:3928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 1816
      2⤵
      • Program crash
      PID:3052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1320 -ip 1320
    1⤵
      PID:448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\dufosf7HpWmPb1dK.exe

      MD5

      bc31f6c304ba6ac92fc203ef0cb4c243

      SHA1

      abc7850eb46fb1252f48e43d23eebd2a957d95e9

      SHA256

      23b9ed8a00a10c4e0d84ab75882ef6fe02b24368b348653ac586b6f05497e01f

      SHA512

      708314a64cf734962b51932c432143eb87f3bf0e97528252543feb6cbca213d24cc4522caa69a71b1e8319e85dae1e9b3bc1a0148d20c55d8a1109f86dfcb0ad

    • C:\ProgramData\dufosf7HpWmPb1dK.exe

      MD5

      bc31f6c304ba6ac92fc203ef0cb4c243

      SHA1

      abc7850eb46fb1252f48e43d23eebd2a957d95e9

      SHA256

      23b9ed8a00a10c4e0d84ab75882ef6fe02b24368b348653ac586b6f05497e01f

      SHA512

      708314a64cf734962b51932c432143eb87f3bf0e97528252543feb6cbca213d24cc4522caa69a71b1e8319e85dae1e9b3bc1a0148d20c55d8a1109f86dfcb0ad

    • memory/1320-138-0x00000000005A0000-0x0000000000AF2000-memory.dmp

      Filesize

      5.3MB

    • memory/1320-135-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB

    • memory/1320-136-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB

    • memory/1320-137-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB

    • memory/1320-132-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB

    • memory/1320-139-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB

    • memory/1320-140-0x00000000005A0000-0x0000000000AF2000-memory.dmp

      Filesize

      5.3MB

    • memory/1320-141-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/1320-142-0x0000000005290000-0x0000000005291000-memory.dmp

      Filesize

      4KB

    • memory/1320-134-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB

    • memory/1320-133-0x0000000075ED0000-0x0000000075FC0000-memory.dmp

      Filesize

      960KB