Analysis
-
max time kernel
132s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-03-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
28166889.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
28166889.exe
Resource
win10v2004-en-20220113
General
-
Target
28166889.exe
-
Size
5.2MB
-
MD5
d6400095bffdf07603da238051f31bd4
-
SHA1
12d517d298cff39d493d1de9e6da6e24c0b4f5ac
-
SHA256
1c524c438438a2998e6f47513a8b639dc7f9c1ea649085bea77b2509f5e62dd5
-
SHA512
fbbdf4cbde7bcd5f859bcbb6da10e2bf892e34cba4178c1f99b150a65aeb743871709535b044904b806b68b4e2051c31445ccf4a10a26b25e192c8eb55cfa2a2
Malware Config
Signatures
-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4256 dufosf7HpWmPb1dK.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28166889.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28166889.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 28166889.exe -
resource yara_rule behavioral2/memory/2708-139-0x0000000000E30000-0x0000000001374000-memory.dmp themida behavioral2/memory/2708-136-0x0000000000E30000-0x0000000001374000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 28166889.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4980 2708 WerFault.exe 78 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2708 28166889.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4256 2708 28166889.exe 79 PID 2708 wrote to memory of 4256 2708 28166889.exe 79 PID 2708 wrote to memory of 4256 2708 28166889.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\28166889.exe"C:\Users\Admin\AppData\Local\Temp\28166889.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\ProgramData\dufosf7HpWmPb1dK.exe"C:\ProgramData\dufosf7HpWmPb1dK.exe"2⤵
- Executes dropped EXE
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 19002⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2708 -ip 27081⤵PID:2868