Overview
overview
10Static
static
10Phoenix/Anarchy.dll
windows7-x64
1Phoenix/Anarchy.dll
windows10-2004-x64
1Phoenix/Di...PC.dll
windows7-x64
1Phoenix/Di...PC.dll
windows10-2004-x64
1Phoenix/Guna.UI2.dll
windows7-x64
1Phoenix/Guna.UI2.dll
windows10-2004-x64
1Phoenix/Ne...on.dll
windows7-x64
1Phoenix/Ne...on.dll
windows10-2004-x64
1Phoenix/Phoenix.exe
windows7-x64
10Phoenix/Phoenix.exe
windows10-2004-x64
10Analysis
-
max time kernel
130s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 13:31
Behavioral task
behavioral1
Sample
Phoenix/Anarchy.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Phoenix/Anarchy.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Phoenix/DiscordRPC.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Phoenix/DiscordRPC.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Phoenix/Guna.UI2.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Phoenix/Guna.UI2.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Phoenix/Newtonsoft.Json.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Phoenix/Newtonsoft.Json.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Phoenix/Phoenix.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Phoenix/Phoenix.exe
Resource
win10v2004-20240419-en
General
-
Target
Phoenix/Phoenix.exe
-
Size
5.6MB
-
MD5
1e09922d9ebca4374a64998bc0949bde
-
SHA1
474e620e852339cf01c44721d6f8663144d4ebd1
-
SHA256
539635d689f2d880bf0e29b6fbc95fa7df68d7d818e0096fba7a8700846a4dc3
-
SHA512
07f63b8bf6e2b4781d859e7a3dc6d85209709ad32c74d68789a435972200c78404d5fdfbc23cd4cb9783d2bacb707b88ef88aed38f0a7a9faf56b2b3ccd6b748
-
SSDEEP
98304:iDVt2sjC7YM1eqh85elVOlVdsOdlVdsO3BbBWIgWljGxRB/LL8pVds+:7siYM0qh85eli4xRBj
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral9/memory/2992-4-0x000000001C440000-0x000000001C652000-memory.dmp family_agenttesla -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 discord.com 4 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2992 Phoenix.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2592 2992 Phoenix.exe 28 PID 2992 wrote to memory of 2592 2992 Phoenix.exe 28 PID 2992 wrote to memory of 2592 2992 Phoenix.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Phoenix\Phoenix.exe"C:\Users\Admin\AppData\Local\Temp\Phoenix\Phoenix.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2992 -s 13562⤵PID:2592
-