Malware Analysis Report

2024-09-22 15:25

Sample ID 220811-s3meeshacl
Target terror.exe
SHA256 114597ce6ce72d2e30ba0d86e20562c2e6b477838d30ed6ec998f315573bc1ba
Tags
phoenixstealer stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

114597ce6ce72d2e30ba0d86e20562c2e6b477838d30ed6ec998f315573bc1ba

Threat Level: Known bad

The file terror.exe was found to be: Known bad.

Malicious Activity Summary

phoenixstealer stealer

PhoenixStealer

Suspicious use of SetThreadContext

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2022-08-11 15:39

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-08-11 15:39

Reported

2022-08-11 15:41

Platform

win10v2004-20220721-en

Max time kernel

89s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\terror.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\terror.exe

"C:\Users\Admin\AppData\Local\Temp\terror.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

Network

Country Destination Domain Proto
US 20.189.173.12:443 tcp
NL 88.221.144.193:80 tcp

Files

memory/4704-130-0x0000000000400000-0x0000000000B55000-memory.dmp

memory/223020-134-0x0000000000000000-mapping.dmp

memory/223020-135-0x0000000000400000-0x000000000048E000-memory.dmp

memory/223020-142-0x0000000000400000-0x000000000048E000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-08-11 15:39

Reported

2022-08-11 15:41

Platform

win7-20220718-en

Max time kernel

39s

Max time network

45s

Command Line

"C:\Users\Admin\AppData\Local\Temp\terror.exe"

Signatures

PhoenixStealer

stealer phoenixstealer

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 892 set thread context of 82768 N/A C:\Users\Admin\AppData\Local\Temp\terror.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Processes

C:\Users\Admin\AppData\Local\Temp\terror.exe

"C:\Users\Admin\AppData\Local\Temp\terror.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

Network

N/A

Files

memory/892-54-0x0000000000400000-0x0000000000B55000-memory.dmp

memory/82768-60-0x0000000000400000-0x000000000048E000-memory.dmp

memory/82768-62-0x0000000000400000-0x000000000048E000-memory.dmp

memory/82768-69-0x0000000000454CB9-mapping.dmp

memory/82768-70-0x0000000075A11000-0x0000000075A13000-memory.dmp

memory/82768-71-0x0000000000400000-0x000000000048E000-memory.dmp

memory/82768-72-0x0000000000400000-0x000000000048E000-memory.dmp