Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-11-2020 10:18

General

  • Target

    bdc0968a6b40243c3b54fe554fa7567b.exe

  • Size

    67KB

  • MD5

    bdc0968a6b40243c3b54fe554fa7567b

  • SHA1

    49d48d747cfbe8310161600d2ae8c7a01f7c74cd

  • SHA256

    01b3da80517886f0b91023294da6be87ec44dd87eadc39b9141950fc54f96783

  • SHA512

    5d715b1334d816a06ab694aa7810e3b1fe56d729a387b2a95dfef6d17cdbf11a1e674d98784681e0d3b4fe752721b02c0d9826f74881027fcfd923cf0574871c

Malware Config

Signatures

  • Phorphiex Payload 10 IoCs
  • Phorphiex Worm

    Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 2 IoCs
  • Executes dropped EXE 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdc0968a6b40243c3b54fe554fa7567b.exe
    "C:\Users\Admin\AppData\Local\Temp\bdc0968a6b40243c3b54fe554fa7567b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Users\Admin\AppData\Local\Temp\6344.exe
      "C:\Users\Admin\AppData\Local\Temp\6344.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\292391863416576\svchost.exe
        C:\292391863416576\svchost.exe
        3⤵
        • Executes dropped EXE
        • Windows security modification
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Users\Admin\AppData\Local\Temp\1906625719.exe
          C:\Users\Admin\AppData\Local\Temp\1906625719.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\216192968722883\svchost.exe
            C:\216192968722883\svchost.exe
            5⤵
            • Executes dropped EXE
            • Windows security modification
            • Suspicious use of WriteProcessMemory
            PID:3628
            • C:\Users\Admin\AppData\Local\Temp\3260731160.exe
              C:\Users\Admin\AppData\Local\Temp\3260731160.exe
              6⤵
              • Executes dropped EXE
              PID:648
            • C:\Users\Admin\AppData\Local\Temp\1603022934.exe
              C:\Users\Admin\AppData\Local\Temp\1603022934.exe
              6⤵
              • Executes dropped EXE
              PID:2668
        • C:\Users\Admin\AppData\Local\Temp\1272213199.exe
          C:\Users\Admin\AppData\Local\Temp\1272213199.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1460
          • C:\Users\Admin\AppData\Local\Temp\35651.exe
            C:\Users\Admin\AppData\Local\Temp\35651.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\notepad.exe
              "C:\Windows\notepad.exe" -c "C:\ProgramData\PnQssBdbSh\cfgi"
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1836
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C WScript "C:\ProgramData\PnQssBdbSh\r.vbs"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Windows\SysWOW64\wscript.exe
                WScript "C:\ProgramData\PnQssBdbSh\r.vbs"
                7⤵
                • Drops startup file
                PID:4076

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\216192968722883\svchost.exe
    MD5

    2b7a233816d3ea9be1b14bc2ae52ebb8

    SHA1

    c84ade76f07945c510f52739797484db02393a11

    SHA256

    311168b8f1914a7427453d8c931ee8e78639aa6dba21265adaee4313b41d8e47

    SHA512

    d9f83e476b899d96545bfdba857dc124fdb725184a4a7168ff4aa757d151f83019c9bea8e1a27657b621cf55bd77bbc99f423ca5fe9af84210ee3cefbc09e037

  • C:\216192968722883\svchost.exe
    MD5

    2b7a233816d3ea9be1b14bc2ae52ebb8

    SHA1

    c84ade76f07945c510f52739797484db02393a11

    SHA256

    311168b8f1914a7427453d8c931ee8e78639aa6dba21265adaee4313b41d8e47

    SHA512

    d9f83e476b899d96545bfdba857dc124fdb725184a4a7168ff4aa757d151f83019c9bea8e1a27657b621cf55bd77bbc99f423ca5fe9af84210ee3cefbc09e037

  • C:\292391863416576\svchost.exe
    MD5

    10941585e933119c70b14961e91acc82

    SHA1

    e629db65702a4d84c9313c2918f5851bdb14b49e

    SHA256

    38637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1

    SHA512

    8f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450

  • C:\292391863416576\svchost.exe
    MD5

    10941585e933119c70b14961e91acc82

    SHA1

    e629db65702a4d84c9313c2918f5851bdb14b49e

    SHA256

    38637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1

    SHA512

    8f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450

  • C:\ProgramData\PnQssBdbSh\cfgi
    MD5

    d91c40a4056494023ae54f0563e5bb89

    SHA1

    416b135965be1fb506b0f6bfcc6c2b234b25145c

    SHA256

    dd996bb09570904d7d08185fb76cfe80bfb5d44a7e36854ee52334eeab8334ea

    SHA512

    403291ae3e90e3b7c7645dcb226151ea5e05a78cb8c044154a6d40398ebcfe6a1be4d8df5305ef0bfb50e9a3da60c363976355975a56ddda3026a55afdad5e0e

  • C:\ProgramData\PnQssBdbSh\r.vbs
    MD5

    d9b393e0df878eadc62db1df2fdaae29

    SHA1

    71393f6cca2f9727b5f9953a3b21784267131c60

    SHA256

    aab053f4effc02e94020eb3e80f11dd37ed2459bbaad5154605a1bb6b44cf5e0

    SHA512

    d95a5a95e2d37b90792480c172a2eb58e9f881d258d375ef051e87d4159c2ffc327fb96b6ff38bbaf65da0efa12a7f7d96d66fba7b9062452eb28e088a287852

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8U21I66T\1[1]
    MD5

    2275ed13db4f19a4d2b3bfc66deb63d9

    SHA1

    0dac76d19829e5d40482e0c03c7bfa275196f8bb

    SHA256

    da977d81ecf967e1a7d54b59273e6140b57678d765b42169664a81ff8c146e39

    SHA512

    97fcb5babceb1f498976ca2409fcd03f19427dac579975c6285e2b04118f7619277c65b579436a15b2dca48537ad2465e7019fe694e9cd97e68eb4cd9d7595c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\2[1]
    MD5

    01b67463f2d156f8967df65d266b0544

    SHA1

    14862f60b8bbb2336a13697edcaa3bb55edaeb19

    SHA256

    65dfc887457748fd1194153c5c6e36c5414015abffd23cc961bf086714c6b0c1

    SHA512

    98c4e1a26074ab6fd146cebf2f3fff139bf39b9862c734db168e8be10f4fcf1f17a5b7b59db26d62ea8d7ff8e7b6086ece3e9a602295dca7543fba2d09b6a52f

  • C:\Users\Admin\AppData\Local\Temp\1272213199.exe
    MD5

    c692e385134135211b73973cf6c35acb

    SHA1

    03accccdf6abf730f1af8ccf136ab36ec5ad02ad

    SHA256

    e84bfd2d79fdf46fd4202725dceb92e3605c2035565511e3d45601a528fd81ea

    SHA512

    179d179c3c73f8d9e90e7db2c1cf7376a684e62f2329635d1b5170826930a95017f02fafdcf40cce6a2e5a35a254b8aabf7c72b0862f1dd19e7b4773c861a3c6

  • C:\Users\Admin\AppData\Local\Temp\1272213199.exe
    MD5

    c692e385134135211b73973cf6c35acb

    SHA1

    03accccdf6abf730f1af8ccf136ab36ec5ad02ad

    SHA256

    e84bfd2d79fdf46fd4202725dceb92e3605c2035565511e3d45601a528fd81ea

    SHA512

    179d179c3c73f8d9e90e7db2c1cf7376a684e62f2329635d1b5170826930a95017f02fafdcf40cce6a2e5a35a254b8aabf7c72b0862f1dd19e7b4773c861a3c6

  • C:\Users\Admin\AppData\Local\Temp\1603022934.exe
    MD5

    c692e385134135211b73973cf6c35acb

    SHA1

    03accccdf6abf730f1af8ccf136ab36ec5ad02ad

    SHA256

    e84bfd2d79fdf46fd4202725dceb92e3605c2035565511e3d45601a528fd81ea

    SHA512

    179d179c3c73f8d9e90e7db2c1cf7376a684e62f2329635d1b5170826930a95017f02fafdcf40cce6a2e5a35a254b8aabf7c72b0862f1dd19e7b4773c861a3c6

  • C:\Users\Admin\AppData\Local\Temp\1603022934.exe
    MD5

    c692e385134135211b73973cf6c35acb

    SHA1

    03accccdf6abf730f1af8ccf136ab36ec5ad02ad

    SHA256

    e84bfd2d79fdf46fd4202725dceb92e3605c2035565511e3d45601a528fd81ea

    SHA512

    179d179c3c73f8d9e90e7db2c1cf7376a684e62f2329635d1b5170826930a95017f02fafdcf40cce6a2e5a35a254b8aabf7c72b0862f1dd19e7b4773c861a3c6

  • C:\Users\Admin\AppData\Local\Temp\1906625719.exe
    MD5

    2b7a233816d3ea9be1b14bc2ae52ebb8

    SHA1

    c84ade76f07945c510f52739797484db02393a11

    SHA256

    311168b8f1914a7427453d8c931ee8e78639aa6dba21265adaee4313b41d8e47

    SHA512

    d9f83e476b899d96545bfdba857dc124fdb725184a4a7168ff4aa757d151f83019c9bea8e1a27657b621cf55bd77bbc99f423ca5fe9af84210ee3cefbc09e037

  • C:\Users\Admin\AppData\Local\Temp\1906625719.exe
    MD5

    2b7a233816d3ea9be1b14bc2ae52ebb8

    SHA1

    c84ade76f07945c510f52739797484db02393a11

    SHA256

    311168b8f1914a7427453d8c931ee8e78639aa6dba21265adaee4313b41d8e47

    SHA512

    d9f83e476b899d96545bfdba857dc124fdb725184a4a7168ff4aa757d151f83019c9bea8e1a27657b621cf55bd77bbc99f423ca5fe9af84210ee3cefbc09e037

  • C:\Users\Admin\AppData\Local\Temp\3260731160.exe
    MD5

    2b7a233816d3ea9be1b14bc2ae52ebb8

    SHA1

    c84ade76f07945c510f52739797484db02393a11

    SHA256

    311168b8f1914a7427453d8c931ee8e78639aa6dba21265adaee4313b41d8e47

    SHA512

    d9f83e476b899d96545bfdba857dc124fdb725184a4a7168ff4aa757d151f83019c9bea8e1a27657b621cf55bd77bbc99f423ca5fe9af84210ee3cefbc09e037

  • C:\Users\Admin\AppData\Local\Temp\3260731160.exe
    MD5

    2b7a233816d3ea9be1b14bc2ae52ebb8

    SHA1

    c84ade76f07945c510f52739797484db02393a11

    SHA256

    311168b8f1914a7427453d8c931ee8e78639aa6dba21265adaee4313b41d8e47

    SHA512

    d9f83e476b899d96545bfdba857dc124fdb725184a4a7168ff4aa757d151f83019c9bea8e1a27657b621cf55bd77bbc99f423ca5fe9af84210ee3cefbc09e037

  • C:\Users\Admin\AppData\Local\Temp\35651.exe
    MD5

    215dc4d9de61e4bebb4fb60f1e1fab4a

    SHA1

    b33581c68016d1d3db429053aef73a92f815b950

    SHA256

    2f1adc1cb3f881d33017ecadb9dfbb4471662ac486d16c7b60680df58839c32c

    SHA512

    929316c0ec8bc639739036747ed2ee2371871222c1855d5082210aff792de91c67ce56554d6ea95a550b000bba0f289eb4843db54b89478049df00875959c7ff

  • C:\Users\Admin\AppData\Local\Temp\35651.exe
    MD5

    215dc4d9de61e4bebb4fb60f1e1fab4a

    SHA1

    b33581c68016d1d3db429053aef73a92f815b950

    SHA256

    2f1adc1cb3f881d33017ecadb9dfbb4471662ac486d16c7b60680df58839c32c

    SHA512

    929316c0ec8bc639739036747ed2ee2371871222c1855d5082210aff792de91c67ce56554d6ea95a550b000bba0f289eb4843db54b89478049df00875959c7ff

  • C:\Users\Admin\AppData\Local\Temp\6344.exe
    MD5

    10941585e933119c70b14961e91acc82

    SHA1

    e629db65702a4d84c9313c2918f5851bdb14b49e

    SHA256

    38637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1

    SHA512

    8f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450

  • C:\Users\Admin\AppData\Local\Temp\6344.exe
    MD5

    10941585e933119c70b14961e91acc82

    SHA1

    e629db65702a4d84c9313c2918f5851bdb14b49e

    SHA256

    38637b0bf898df12f7549c595eb255b38995e8da8058bff700428d90e98052c1

    SHA512

    8f620be8bdee03372af507e57e5a2d8f98b3b5ee6f50d37b43c94ecd93255d7dd052b2d51ee83c27e03353154f005636870dee6961f8d0b3d49b600ffe7d2450

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ulZYCdTsml.url
    MD5

    dc6c58f0b92c049a61cf70148ea1dbd9

    SHA1

    2f3a61fc7a2bfc8a8b0cc368aa153905dec1a06a

    SHA256

    ef58b218662edfb165c814ce47fee0b98b4c774f963ad93d66cbc6903f92aed5

    SHA512

    58eebadd2b546d459d39f7024834607dc3e8f65084d4323a6be567d301c2cc1ffcf78a9672019f8b45093352f8a5ba4ed88c63f1173eab662e3f386671c1f1a0

  • memory/648-18-0x0000000000000000-mapping.dmp
  • memory/1460-11-0x0000000000000000-mapping.dmp
  • memory/1836-32-0x0000000000400000-0x0000000000A16000-memory.dmp
    Filesize

    6.1MB

  • memory/1836-36-0x0000000000400000-0x0000000000A16000-memory.dmp
    Filesize

    6.1MB

  • memory/1836-34-0x0000000000400000-0x0000000000A16000-memory.dmp
    Filesize

    6.1MB

  • memory/1836-33-0x0000000000A14AA0-mapping.dmp
  • memory/1836-30-0x0000000000400000-0x0000000000A16000-memory.dmp
    Filesize

    6.1MB

  • memory/1836-31-0x0000000000400000-0x0000000000A16000-memory.dmp
    Filesize

    6.1MB

  • memory/2660-29-0x0000000005010000-0x0000000005011000-memory.dmp
    Filesize

    4KB

  • memory/2660-25-0x0000000000000000-mapping.dmp
  • memory/2668-22-0x0000000000000000-mapping.dmp
  • memory/2828-37-0x0000000000000000-mapping.dmp
  • memory/2884-5-0x0000000000000000-mapping.dmp
  • memory/3612-8-0x0000000000000000-mapping.dmp
  • memory/3628-14-0x0000000000000000-mapping.dmp
  • memory/3680-2-0x0000000000000000-mapping.dmp
  • memory/4076-38-0x0000000000000000-mapping.dmp