Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 13:42
Behavioral task
behavioral1
Sample
Phoenix v1.4.exe
Resource
win7-20231129-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
Phoenix v1.4.exe
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
Phoenix v1.4.exe
-
Size
6.1MB
-
MD5
77e12ffe45744e1b737c1b37112fd034
-
SHA1
69dd3bc2e3d87bb691df333ae42273a1f7b5e143
-
SHA256
b066806fa69f212b043909ec55f01dbb2060296f1629a92a5c33be74751427a0
-
SHA512
6e15e494eb95da98e0cbfdca6057e2cb61767f5bd8d972d7bba87c08a0dc61fbc4b9f4b4f47b72e78b71d3347601e1191e5f07d589a70bcd08ba70171fc579d5
-
SSDEEP
98304:aMLR1hBqbYl50ZGtvdjcnjtm0QhXmXoPKnXonPKpXe4vxOXeXpnUzf:aMFwYjntRYPOFPKwS1eMOXe5Uzf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3368-9-0x0000000140000000-0x0000000140B32000-memory.dmp vmprotect behavioral2/memory/3368-19-0x0000000140000000-0x0000000140B32000-memory.dmp vmprotect behavioral2/memory/3368-23-0x0000000140000000-0x0000000140B32000-memory.dmp vmprotect behavioral2/memory/3588-45-0x0000000140000000-0x0000000140B32000-memory.dmp vmprotect behavioral2/memory/1544-59-0x0000000140000000-0x0000000140B32000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3368 Phoenix v1.4.exe 3588 Phoenix v1.4.exe 1544 Phoenix v1.4.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3368 Phoenix v1.4.exe 3368 Phoenix v1.4.exe 3368 Phoenix v1.4.exe 3368 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 3588 Phoenix v1.4.exe 3588 Phoenix v1.4.exe 3588 Phoenix v1.4.exe 3588 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 1544 Phoenix v1.4.exe 1544 Phoenix v1.4.exe 1544 Phoenix v1.4.exe 1544 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4596 taskmgr.exe Token: SeSystemProfilePrivilege 4596 taskmgr.exe Token: SeCreateGlobalPrivilege 4596 taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 3368 Phoenix v1.4.exe 3368 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 3588 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 3588 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 3368 Phoenix v1.4.exe 3368 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 3588 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 3588 Phoenix v1.4.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe 4596 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3368 Phoenix v1.4.exe 3588 Phoenix v1.4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Phoenix v1.4.exe"C:\Users\Admin\AppData\Local\Temp\Phoenix v1.4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3368
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4596
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Phoenix v1.4.exe"C:\Users\Admin\AppData\Local\Temp\Phoenix v1.4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3588
-
C:\Users\Admin\AppData\Local\Temp\Phoenix v1.4.exe"C:\Users\Admin\AppData\Local\Temp\Phoenix v1.4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1544