Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-11-2020 09:32
Static task
static1
Behavioral task
behavioral1
Sample
10941585e933119c70b14961e91acc82.exe
Resource
win7v20201028
General
-
Target
10941585e933119c70b14961e91acc82.exe
-
Size
31KB
-
MD5
10941585e933119c70b14961e91acc82
-
SHA1
e629db65702a4d84c9313c2918f5851bdb14b49e
-
SHA256
38637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1
-
SHA512
8f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450
Malware Config
Signatures
-
Phorphiex Payload 4 IoCs
Processes:
resource yara_rule C:\1893860866577\svchost.exe family_phorphiex C:\1893860866577\svchost.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\2023616281.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\2023616281.exe family_phorphiex -
Executes dropped EXE 3 IoCs
Processes:
svchost.exe2023616281.exe1095910114.exepid process 4024 svchost.exe 576 2023616281.exe 996 1095910114.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
10941585e933119c70b14961e91acc82.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\1893860866577\\svchost.exe" 10941585e933119c70b14961e91acc82.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\1893860866577\\svchost.exe" 10941585e933119c70b14961e91acc82.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
10941585e933119c70b14961e91acc82.exesvchost.exedescription pid process target process PID 4684 wrote to memory of 4024 4684 10941585e933119c70b14961e91acc82.exe svchost.exe PID 4684 wrote to memory of 4024 4684 10941585e933119c70b14961e91acc82.exe svchost.exe PID 4684 wrote to memory of 4024 4684 10941585e933119c70b14961e91acc82.exe svchost.exe PID 4024 wrote to memory of 576 4024 svchost.exe 2023616281.exe PID 4024 wrote to memory of 576 4024 svchost.exe 2023616281.exe PID 4024 wrote to memory of 576 4024 svchost.exe 2023616281.exe PID 4024 wrote to memory of 996 4024 svchost.exe 1095910114.exe PID 4024 wrote to memory of 996 4024 svchost.exe 1095910114.exe PID 4024 wrote to memory of 996 4024 svchost.exe 1095910114.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10941585e933119c70b14961e91acc82.exe"C:\Users\Admin\AppData\Local\Temp\10941585e933119c70b14961e91acc82.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\1893860866577\svchost.exeC:\1893860866577\svchost.exe2⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2023616281.exeC:\Users\Admin\AppData\Local\Temp\2023616281.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1095910114.exeC:\Users\Admin\AppData\Local\Temp\1095910114.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\1893860866577\svchost.exeMD5
10941585e933119c70b14961e91acc82
SHA1e629db65702a4d84c9313c2918f5851bdb14b49e
SHA25638637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1
SHA5128f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450
-
C:\1893860866577\svchost.exeMD5
10941585e933119c70b14961e91acc82
SHA1e629db65702a4d84c9313c2918f5851bdb14b49e
SHA25638637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1
SHA5128f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450
-
C:\Users\Admin\AppData\Local\Temp\1095910114.exeMD5
4a61038c4d176da1c3c522b57be2fe55
SHA13f8ec8a9c51e1ae444e58ee1f14d3556d6388f90
SHA2569b4aba32e6f88813733cacf7c43896a3c7b81bda7e5dd3df5dd9877b9aa833f2
SHA51276b2a3b790accc2ffc3c466494dbdaa7448ef4fe023d75129c63e5e64d5a91960460d88c65838592e6af750b219e420c55c7f0f4ef9d2237530a494e6c523f31
-
C:\Users\Admin\AppData\Local\Temp\1095910114.exeMD5
4a61038c4d176da1c3c522b57be2fe55
SHA13f8ec8a9c51e1ae444e58ee1f14d3556d6388f90
SHA2569b4aba32e6f88813733cacf7c43896a3c7b81bda7e5dd3df5dd9877b9aa833f2
SHA51276b2a3b790accc2ffc3c466494dbdaa7448ef4fe023d75129c63e5e64d5a91960460d88c65838592e6af750b219e420c55c7f0f4ef9d2237530a494e6c523f31
-
C:\Users\Admin\AppData\Local\Temp\2023616281.exeMD5
10941585e933119c70b14961e91acc82
SHA1e629db65702a4d84c9313c2918f5851bdb14b49e
SHA25638637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1
SHA5128f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450
-
C:\Users\Admin\AppData\Local\Temp\2023616281.exeMD5
10941585e933119c70b14961e91acc82
SHA1e629db65702a4d84c9313c2918f5851bdb14b49e
SHA25638637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1
SHA5128f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450
-
memory/576-3-0x0000000000000000-mapping.dmp
-
memory/996-6-0x0000000000000000-mapping.dmp
-
memory/4024-0-0x0000000000000000-mapping.dmp