Analysis
-
max time kernel
4294178s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
19-03-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
28166889.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
28166889.exe
Resource
win10v2004-en-20220113
General
-
Target
28166889.exe
-
Size
5.2MB
-
MD5
d6400095bffdf07603da238051f31bd4
-
SHA1
12d517d298cff39d493d1de9e6da6e24c0b4f5ac
-
SHA256
1c524c438438a2998e6f47513a8b639dc7f9c1ea649085bea77b2509f5e62dd5
-
SHA512
fbbdf4cbde7bcd5f859bcbb6da10e2bf892e34cba4178c1f99b150a65aeb743871709535b044904b806b68b4e2051c31445ccf4a10a26b25e192c8eb55cfa2a2
Malware Config
Signatures
-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 820 dufosf7HpWmPb1dK.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28166889.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28166889.exe -
Loads dropped DLL 3 IoCs
pid Process 1176 28166889.exe 820 dufosf7HpWmPb1dK.exe 820 dufosf7HpWmPb1dK.exe -
resource yara_rule behavioral1/memory/1176-60-0x0000000000D80000-0x00000000012C4000-memory.dmp themida behavioral1/memory/1176-61-0x0000000000D80000-0x00000000012C4000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 28166889.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1092 1176 WerFault.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1176 28166889.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 820 1176 28166889.exe 27 PID 1176 wrote to memory of 1092 1176 28166889.exe 28 PID 1176 wrote to memory of 1092 1176 28166889.exe 28 PID 1176 wrote to memory of 1092 1176 28166889.exe 28 PID 1176 wrote to memory of 1092 1176 28166889.exe 28 PID 1176 wrote to memory of 1092 1176 28166889.exe 28 PID 1176 wrote to memory of 1092 1176 28166889.exe 28 PID 1176 wrote to memory of 1092 1176 28166889.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28166889.exe"C:\Users\Admin\AppData\Local\Temp\28166889.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\ProgramData\dufosf7HpWmPb1dK.exe"C:\ProgramData\dufosf7HpWmPb1dK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 17682⤵
- Program crash
PID:1092
-