Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-02-2021 18:39
Static task
static1
Behavioral task
behavioral1
Sample
1270d03503499a3dc08a3d959ded61f5.exe
Resource
win7v20201028
General
-
Target
1270d03503499a3dc08a3d959ded61f5.exe
-
Size
35KB
-
MD5
1270d03503499a3dc08a3d959ded61f5
-
SHA1
965b86352f0a5aea6969be8466e5318a0152b32a
-
SHA256
329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
-
SHA512
418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
Malware Config
Signatures
-
Phorphiex Payload 6 IoCs
Processes:
resource yara_rule C:\18982126630668\svchost.exe family_phorphiex C:\18982126630668\svchost.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\3225838589.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\3225838589.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\2898422098.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\2898422098.exe family_phorphiex -
Executes dropped EXE 6 IoCs
Processes:
svchost.exe3225838589.exe2898422098.exe1655535444.exe2336139219.exe2121514995.exepid process 3988 svchost.exe 3568 3225838589.exe 3512 2898422098.exe 1308 1655535444.exe 636 2336139219.exe 3796 2121514995.exe -
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1270d03503499a3dc08a3d959ded61f5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\18982126630668\\svchost.exe" 1270d03503499a3dc08a3d959ded61f5.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\18982126630668\\svchost.exe" 1270d03503499a3dc08a3d959ded61f5.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1655535444.exepid process 1308 1655535444.exe 1308 1655535444.exe 1308 1655535444.exe 1308 1655535444.exe 1308 1655535444.exe 1308 1655535444.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1270d03503499a3dc08a3d959ded61f5.exesvchost.exedescription pid process target process PID 500 wrote to memory of 3988 500 1270d03503499a3dc08a3d959ded61f5.exe svchost.exe PID 500 wrote to memory of 3988 500 1270d03503499a3dc08a3d959ded61f5.exe svchost.exe PID 500 wrote to memory of 3988 500 1270d03503499a3dc08a3d959ded61f5.exe svchost.exe PID 3988 wrote to memory of 3568 3988 svchost.exe 3225838589.exe PID 3988 wrote to memory of 3568 3988 svchost.exe 3225838589.exe PID 3988 wrote to memory of 3568 3988 svchost.exe 3225838589.exe PID 3988 wrote to memory of 3512 3988 svchost.exe 2898422098.exe PID 3988 wrote to memory of 3512 3988 svchost.exe 2898422098.exe PID 3988 wrote to memory of 3512 3988 svchost.exe 2898422098.exe PID 3988 wrote to memory of 1308 3988 svchost.exe 1655535444.exe PID 3988 wrote to memory of 1308 3988 svchost.exe 1655535444.exe PID 3988 wrote to memory of 1308 3988 svchost.exe 1655535444.exe PID 3988 wrote to memory of 636 3988 svchost.exe 2336139219.exe PID 3988 wrote to memory of 636 3988 svchost.exe 2336139219.exe PID 3988 wrote to memory of 636 3988 svchost.exe 2336139219.exe PID 3988 wrote to memory of 3796 3988 svchost.exe 2121514995.exe PID 3988 wrote to memory of 3796 3988 svchost.exe 2121514995.exe PID 3988 wrote to memory of 3796 3988 svchost.exe 2121514995.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1270d03503499a3dc08a3d959ded61f5.exe"C:\Users\Admin\AppData\Local\Temp\1270d03503499a3dc08a3d959ded61f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\18982126630668\svchost.exeC:\18982126630668\svchost.exe2⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3225838589.exeC:\Users\Admin\AppData\Local\Temp\3225838589.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2898422098.exeC:\Users\Admin\AppData\Local\Temp\2898422098.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1655535444.exeC:\Users\Admin\AppData\Local\Temp\1655535444.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\2336139219.exeC:\Users\Admin\AppData\Local\Temp\2336139219.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2121514995.exeC:\Users\Admin\AppData\Local\Temp\2121514995.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\18982126630668\svchost.exeMD5
1270d03503499a3dc08a3d959ded61f5
SHA1965b86352f0a5aea6969be8466e5318a0152b32a
SHA256329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
SHA512418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
-
C:\18982126630668\svchost.exeMD5
1270d03503499a3dc08a3d959ded61f5
SHA1965b86352f0a5aea6969be8466e5318a0152b32a
SHA256329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
SHA512418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
-
C:\Users\Admin\AppData\Local\Temp\1655535444.exeMD5
8878c92a4904f6a5ee5afe2b76f86dc3
SHA10aad86be67dfe4a80020255ae85314d57ab1690b
SHA2569eed42c3fe325c8396d77c3519a8673024acbb2a345e078e84061652d2a3dca9
SHA51219453390764abfb046902ac20ada4db9e726626ca5420f4498def4ca19cecf98720abd8789df22d133098ddb29e1596d0ba78ebafca4cfa3fcb68a76f96a6f49
-
C:\Users\Admin\AppData\Local\Temp\1655535444.exeMD5
8878c92a4904f6a5ee5afe2b76f86dc3
SHA10aad86be67dfe4a80020255ae85314d57ab1690b
SHA2569eed42c3fe325c8396d77c3519a8673024acbb2a345e078e84061652d2a3dca9
SHA51219453390764abfb046902ac20ada4db9e726626ca5420f4498def4ca19cecf98720abd8789df22d133098ddb29e1596d0ba78ebafca4cfa3fcb68a76f96a6f49
-
C:\Users\Admin\AppData\Local\Temp\2121514995.exeMD5
eda49f0af7615c2466e06cee3e8bbf79
SHA18091d27cd5842328f0e749760ec83ef7feeca4cb
SHA2561068d6fb0b6367a38d5b723bc16ab84d2d931ca1898f2b52cd1fd690a4668d03
SHA5124f4b3f6e70b80394e208fb8f10b08ffecee0129998fadec3e641fea1178b92691344097f44d03dddf2eb610987cbb18f2c84044b045808c77f74801ee1ae2a67
-
C:\Users\Admin\AppData\Local\Temp\2121514995.exeMD5
eda49f0af7615c2466e06cee3e8bbf79
SHA18091d27cd5842328f0e749760ec83ef7feeca4cb
SHA2561068d6fb0b6367a38d5b723bc16ab84d2d931ca1898f2b52cd1fd690a4668d03
SHA5124f4b3f6e70b80394e208fb8f10b08ffecee0129998fadec3e641fea1178b92691344097f44d03dddf2eb610987cbb18f2c84044b045808c77f74801ee1ae2a67
-
C:\Users\Admin\AppData\Local\Temp\2336139219.exeMD5
01f4959a2587ffe1528144ca155f2df7
SHA1a92ff68d42499eeb8670b6e4f19489f9d4323679
SHA256b469c79ab9cceb82f577f01bdcd72226005a42680a78696a938c7b83a81fbc62
SHA51287a97b9f130ac0bd060768190a131eb3c841eb2f93a859c34b5a3bbfa9b6806d8b434f99a2373395c35353a53908782cc1ca362509e8c40cd9c7e43331b7098b
-
C:\Users\Admin\AppData\Local\Temp\2336139219.exeMD5
01f4959a2587ffe1528144ca155f2df7
SHA1a92ff68d42499eeb8670b6e4f19489f9d4323679
SHA256b469c79ab9cceb82f577f01bdcd72226005a42680a78696a938c7b83a81fbc62
SHA51287a97b9f130ac0bd060768190a131eb3c841eb2f93a859c34b5a3bbfa9b6806d8b434f99a2373395c35353a53908782cc1ca362509e8c40cd9c7e43331b7098b
-
C:\Users\Admin\AppData\Local\Temp\2898422098.exeMD5
1270d03503499a3dc08a3d959ded61f5
SHA1965b86352f0a5aea6969be8466e5318a0152b32a
SHA256329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
SHA512418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
-
C:\Users\Admin\AppData\Local\Temp\2898422098.exeMD5
1270d03503499a3dc08a3d959ded61f5
SHA1965b86352f0a5aea6969be8466e5318a0152b32a
SHA256329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
SHA512418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
-
C:\Users\Admin\AppData\Local\Temp\3225838589.exeMD5
1270d03503499a3dc08a3d959ded61f5
SHA1965b86352f0a5aea6969be8466e5318a0152b32a
SHA256329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
SHA512418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
-
C:\Users\Admin\AppData\Local\Temp\3225838589.exeMD5
1270d03503499a3dc08a3d959ded61f5
SHA1965b86352f0a5aea6969be8466e5318a0152b32a
SHA256329ea43f5027e79bb3151ce827fadbc6173a84218fd984ae4a4b44b478411339
SHA512418bda6ff2b2ca398372a7311605360e2e6f2506d083a26234bac19387e8ea60ad7c72fce35f439134fb70fb983f233e2748c868b75de61a40ff27cbe4a9984d
-
memory/636-20-0x0000000000000000-mapping.dmp
-
memory/1308-15-0x0000000003340000-0x0000000003341000-memory.dmpFilesize
4KB
-
memory/1308-16-0x0000000002B40000-0x0000000002B41000-memory.dmpFilesize
4KB
-
memory/1308-14-0x0000000002B40000-0x0000000002B41000-memory.dmpFilesize
4KB
-
memory/1308-11-0x0000000000000000-mapping.dmp
-
memory/3512-8-0x0000000000000000-mapping.dmp
-
memory/3568-5-0x0000000000000000-mapping.dmp
-
memory/3796-23-0x0000000000000000-mapping.dmp
-
memory/3988-2-0x0000000000000000-mapping.dmp