Analysis

  • max time kernel
    154s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    27-04-2022 18:47

General

  • Target

    494b20591ce398e5421fba0bf1b4b6481f9d78061ce1e44ff0cb6e5dae7c237e.exe

  • Size

    1.5MB

  • MD5

    7f839362f94f43a6b5bdde485470f4aa

  • SHA1

    bf9657ce81dbe25add5a8abcd5b5a7d4e8c58eef

  • SHA256

    494b20591ce398e5421fba0bf1b4b6481f9d78061ce1e44ff0cb6e5dae7c237e

  • SHA512

    e940dd1adcc4b7279098ae535b8fa3593130a0998797f5ccb9dcb4da5a22cbd0f7ef724f2fe53fd1828bb9993cd2389ecc7a53c80941465f88da51cf4fec3c61

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\494b20591ce398e5421fba0bf1b4b6481f9d78061ce1e44ff0cb6e5dae7c237e.exe
    "C:\Users\Admin\AppData\Local\Temp\494b20591ce398e5421fba0bf1b4b6481f9d78061ce1e44ff0cb6e5dae7c237e.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1172

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1172-130-0x0000000076F40000-0x00000000770E3000-memory.dmp

    Filesize

    1.6MB

  • memory/1172-131-0x00000000000E0000-0x00000000004C1000-memory.dmp

    Filesize

    3.9MB