Analysis
-
max time kernel
70s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 17:39
Behavioral task
behavioral1
Sample
PhoenixC2-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
PhoenixC2-main.zip
Resource
win11-20241007-en
General
-
Target
PhoenixC2-main.zip
-
Size
6.8MB
-
MD5
4eb6236503b5183b472da37e64cd1607
-
SHA1
7c3fe88f5e3d62461e847c1cc6033bb157e20300
-
SHA256
10fb0668623a29baa0c1e54448750fa18d3e3e6b5e8622f5d0dacde9513dcdb6
-
SHA512
399cae4b1707841266d152336c6d85d9de6ed99eb3cddb09af747ecde6c7e47fc0d8e16d7cacaae10aaacb62650ab4ebaa82d1c8bdc464bfcfcfd843eae80004
-
SSDEEP
196608:dq2Comx5bpXRCX2Xmb8jYYr3t/WabbfUogn+V2fA:QXNXRW2XOWvrd/WabDUoL0A
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 7 IoCs
pid Process 588 PhoenixC2.exe 4040 PhoenixC2.exe 1064 PhoenixC2.exe 4880 PhoenixC2.exe 4608 PhoenixC2.exe 756 PhoenixC2.exe 3708 PhoenixC2.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 588 set thread context of 4040 588 PhoenixC2.exe 107 PID 1064 set thread context of 4880 1064 PhoenixC2.exe 111 PID 4608 set thread context of 3708 4608 PhoenixC2.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhoenixC2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhoenixC2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhoenixC2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhoenixC2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1088 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1088 7zFM.exe Token: 35 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1088 7zFM.exe 1088 7zFM.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 588 wrote to memory of 4040 588 PhoenixC2.exe 107 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 1064 wrote to memory of 4880 1064 PhoenixC2.exe 111 PID 4608 wrote to memory of 756 4608 PhoenixC2.exe 115 PID 4608 wrote to memory of 756 4608 PhoenixC2.exe 115 PID 4608 wrote to memory of 756 4608 PhoenixC2.exe 115 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116 PID 4608 wrote to memory of 3708 4608 PhoenixC2.exe 116
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"2⤵
- Executes dropped EXE
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixC2-main\PhoenixC2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD53c4161be295e9e9d019ce68dae82d60a
SHA136447fc6418e209dff1bb8a5e576f4d46e3b3296
SHA2560f6481dabf7871823f259eb95f3b85c37d1de8a7d1884ac77a97d887cf96f75d
SHA512cfa2d491a5d28beb8eb908d5af61254ac4c4c88e74c53d5d00ae15ef0731df1654304199996545d1074814c0ea8a032957b28d70774f05347616428e667f70e6