Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe
Resource
win10v2004-20220414-en
General
-
Target
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe
-
Size
132KB
-
MD5
24bde49d5fa1232637c8cd6ca2108d96
-
SHA1
630b54ad204dc873fe97d5d37f8f3e47a61df47c
-
SHA256
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e
-
SHA512
eb8e7cfbe91491bd9ef6a7d3e83dbd5c9f28a88063ab251d3c4367fb92ddfa3c32959155112616e9d06ac590d56541409d688294898c7f3d16a9bc7efeb35918
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat phoenixadt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix phoenixadt.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" phoenixadt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4\WpadDecisionReason = "1" phoenixadt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4\WpadDecisionTime = 104a3d685c74d801 phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad phoenixadt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED} phoenixadt.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadNetworkName = "Network 3" phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4 phoenixadt.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings phoenixadt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" phoenixadt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\0a-43-2e-98-cc-c4 phoenixadt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4\WpadDecision = "0" phoenixadt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 phoenixadt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadDecisionReason = "1" phoenixadt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadDecisionTime = 104a3d685c74d801 phoenixadt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadDecision = "0" phoenixadt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections phoenixadt.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2016 phoenixadt.exe 2016 phoenixadt.exe 2016 phoenixadt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1708 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 908 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 1708 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 2028 phoenixadt.exe 2016 phoenixadt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 908 wrote to memory of 1708 908 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 27 PID 908 wrote to memory of 1708 908 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 27 PID 908 wrote to memory of 1708 908 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 27 PID 908 wrote to memory of 1708 908 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 27 PID 2028 wrote to memory of 2016 2028 phoenixadt.exe 29 PID 2028 wrote to memory of 2016 2028 phoenixadt.exe 29 PID 2028 wrote to memory of 2016 2028 phoenixadt.exe 29 PID 2028 wrote to memory of 2016 2028 phoenixadt.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe"C:\Users\Admin\AppData\Local\Temp\095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe--7823d41c2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1708
-
-
C:\Windows\SysWOW64\phoenixadt.exe"C:\Windows\SysWOW64\phoenixadt.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\phoenixadt.exe--ec3bc2b42⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2016
-