Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 19:47
Static task
static1
Behavioral task
behavioral1
Sample
sphinx_1.0.2.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sphinx_1.0.2.0.vir.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
sphinx_1.0.2.0.vir.exe
-
Size
1.5MB
-
MD5
03daacbdcdd8b7a202fd3d4c56ca3bf4
-
SHA1
8625c393222f587074feee1af1c6e4807faea43f
-
SHA256
c0dfbb822dea47692a8ed0d266c518495f1a3efd3a4208fb5251bcdf08f18d42
-
SHA512
775dcd98efc7d5f955734e65cd156b61f4740740746669305a4c9712d197564e016f77da5d6c5fab244e78eb9efb2df58266fcaf61e89c5e3ad6a3e2e4a4acaa
Score
8/10
Malware Config
Signatures
-
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cmd.exe -
Suspicious use of WriteProcessMemory 78 IoCs
Processes:
sphinx_1.0.2.0.vir.exesphinx_1.0.2.0.vir.exepyilc.exepyilc.exedescription pid process target process PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1124 wrote to memory of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 1416 wrote to memory of 280 1416 sphinx_1.0.2.0.vir.exe pyilc.exe PID 1416 wrote to memory of 280 1416 sphinx_1.0.2.0.vir.exe pyilc.exe PID 1416 wrote to memory of 280 1416 sphinx_1.0.2.0.vir.exe pyilc.exe PID 1416 wrote to memory of 280 1416 sphinx_1.0.2.0.vir.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 280 wrote to memory of 272 280 pyilc.exe pyilc.exe PID 1416 wrote to memory of 1060 1416 sphinx_1.0.2.0.vir.exe cmd.exe PID 1416 wrote to memory of 1060 1416 sphinx_1.0.2.0.vir.exe cmd.exe PID 1416 wrote to memory of 1060 1416 sphinx_1.0.2.0.vir.exe cmd.exe PID 1416 wrote to memory of 1060 1416 sphinx_1.0.2.0.vir.exe cmd.exe PID 272 wrote to memory of 1112 272 pyilc.exe taskhost.exe PID 272 wrote to memory of 1112 272 pyilc.exe taskhost.exe PID 272 wrote to memory of 1112 272 pyilc.exe taskhost.exe PID 272 wrote to memory of 1112 272 pyilc.exe taskhost.exe PID 272 wrote to memory of 1112 272 pyilc.exe taskhost.exe PID 272 wrote to memory of 1236 272 pyilc.exe Dwm.exe PID 272 wrote to memory of 1236 272 pyilc.exe Dwm.exe PID 272 wrote to memory of 1236 272 pyilc.exe Dwm.exe PID 272 wrote to memory of 1236 272 pyilc.exe Dwm.exe PID 272 wrote to memory of 1236 272 pyilc.exe Dwm.exe PID 272 wrote to memory of 1280 272 pyilc.exe Explorer.EXE PID 272 wrote to memory of 1280 272 pyilc.exe Explorer.EXE PID 272 wrote to memory of 1280 272 pyilc.exe Explorer.EXE PID 272 wrote to memory of 1280 272 pyilc.exe Explorer.EXE PID 272 wrote to memory of 1280 272 pyilc.exe Explorer.EXE PID 272 wrote to memory of 1060 272 pyilc.exe cmd.exe PID 272 wrote to memory of 1060 272 pyilc.exe cmd.exe PID 272 wrote to memory of 1060 272 pyilc.exe cmd.exe PID 272 wrote to memory of 1060 272 pyilc.exe cmd.exe PID 272 wrote to memory of 1060 272 pyilc.exe cmd.exe PID 272 wrote to memory of 1808 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1808 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1808 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1808 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1792 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1792 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1792 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1792 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1792 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1792 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1808 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1808 272 pyilc.exe explorer.exe PID 272 wrote to memory of 1836 272 pyilc.exe conhost.exe PID 272 wrote to memory of 1836 272 pyilc.exe conhost.exe PID 272 wrote to memory of 1836 272 pyilc.exe conhost.exe PID 272 wrote to memory of 1836 272 pyilc.exe conhost.exe PID 272 wrote to memory of 1836 272 pyilc.exe conhost.exe PID 272 wrote to memory of 1380 272 pyilc.exe conhost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
sphinx_1.0.2.0.vir.exepyilc.exedescription pid process target process PID 1124 set thread context of 1416 1124 sphinx_1.0.2.0.vir.exe sphinx_1.0.2.0.vir.exe PID 280 set thread context of 272 280 pyilc.exe pyilc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sphinx_1.0.2.0.vir.exedescription pid process Token: SeSecurityPrivilege 1416 sphinx_1.0.2.0.vir.exe -
Loads dropped DLL 2 IoCs
Processes:
sphinx_1.0.2.0.vir.exepid process 1416 sphinx_1.0.2.0.vir.exe 1416 sphinx_1.0.2.0.vir.exe -
Executes dropped EXE 2 IoCs
Processes:
pyilc.exepyilc.exepid process 280 pyilc.exe 272 pyilc.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
pyilc.exeexplorer.exepid process 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 1792 explorer.exe 1792 explorer.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe 272 pyilc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1060 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
sphinx_1.0.2.0.vir.exepyilc.exepid process 1124 sphinx_1.0.2.0.vir.exe 280 pyilc.exe -
Processes:
resource yara_rule behavioral1/memory/1792-25-0x0000000000400000-0x00000000007A5000-memory.dmp upx behavioral1/memory/1792-26-0x0000000000400000-0x00000000007A5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
pyilc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\Currentversion\Run pyilc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C572FCBA-7115-C3A4-47BE-FA55C875F16F} = "C:\\Users\\Admin\\AppData\\Roaming\\Kieha\\pyilc.exe" pyilc.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.2.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.2.0.vir.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.2.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.2.0.vir.exe"3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe"C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe"4⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe"C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe"5⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Adds Run key to start application
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe" --SocksPort 9050 --ControlPort 9051 --HiddenServiceDir "C:\Users\Admin\AppData\Roaming\shs" --HiddenServicePort "33212 127.0.0.1:33212"6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe" socksParentProxy=localhost:90506⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp563b74c6.bat"4⤵
- Modifies Internet Explorer settings
- Deletes itself
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-89422237013662779201156095202-14048187971105583733-118048096610671447781554150222"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "837646631-1002634262-2019128416277052119874147609-1821738417-1437726271-708820428"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp563b74c6.bat
-
C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe
-
C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe
-
C:\Users\Admin\AppData\Roaming\Kieha\pyilc.exe
-
\Users\Admin\AppData\Roaming\Kieha\pyilc.exe
-
\Users\Admin\AppData\Roaming\Kieha\pyilc.exe
-
memory/272-18-0x00000000004190C4-mapping.dmp
-
memory/280-11-0x0000000000000000-mapping.dmp
-
memory/280-15-0x000000000063A000-0x000000000063C000-memory.dmpFilesize
8KB
-
memory/1060-22-0x0000000000000000-mapping.dmp
-
memory/1060-21-0x0000000000000000-mapping.dmp
-
memory/1124-5-0x000000000072E000-0x000000000072F000-memory.dmpFilesize
4KB
-
memory/1124-2-0x000000000072A000-0x000000000072C000-memory.dmpFilesize
8KB
-
memory/1124-4-0x000000000072D000-0x000000000072E000-memory.dmpFilesize
4KB
-
memory/1124-3-0x000000000072C000-0x000000000072D000-memory.dmpFilesize
4KB
-
memory/1416-6-0x0000000000400000-0x0000000000577000-memory.dmpFilesize
1.5MB
-
memory/1416-7-0x00000000004190C4-mapping.dmp
-
memory/1416-8-0x0000000000400000-0x0000000000577000-memory.dmpFilesize
1.5MB
-
memory/1792-24-0x0000000000000000-mapping.dmp
-
memory/1792-25-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/1792-26-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/1792-29-0x0000000003070000-0x0000000003081000-memory.dmpFilesize
68KB
-
memory/1792-30-0x0000000003480000-0x0000000003491000-memory.dmpFilesize
68KB
-
memory/1792-31-0x0000000003070000-0x0000000003081000-memory.dmpFilesize
68KB
-
memory/1792-325-0x0000000003070000-0x0000000003081000-memory.dmpFilesize
68KB
-
memory/1792-326-0x0000000003480000-0x0000000003491000-memory.dmpFilesize
68KB
-
memory/1792-327-0x0000000003070000-0x0000000003081000-memory.dmpFilesize
68KB
-
memory/1808-27-0x0000000000000000-mapping.dmp
-
memory/1808-28-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB