Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    24-05-2021 18:08

General

  • Target

    92ec0ad5172f3a97d6656b70c111af98.exe

  • Size

    7KB

  • MD5

    92ec0ad5172f3a97d6656b70c111af98

  • SHA1

    e15fc1668ccdaf70e5831906191f611136b7ac65

  • SHA256

    5e31f3d2ad06413f4c3824c6bbe56cf7dffda38cec5bd1b2c0c377718a11297c

  • SHA512

    f895ac70eb9c68b9361b32d71c3135f3ccd2f7b676d03061677416b883a1be7a8bad85df8de8202f612ebdfa8564ce77d34f7d5eb9a818fac0098cb4ca856762

Malware Config

Signatures

  • Phorphiex Payload 4 IoCs
  • Phorphiex Worm

    Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92ec0ad5172f3a97d6656b70c111af98.exe
    "C:\Users\Admin\AppData\Local\Temp\92ec0ad5172f3a97d6656b70c111af98.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Users\Admin\AppData\Local\Temp\3478027055.exe
      C:\Users\Admin\AppData\Local\Temp\3478027055.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\13185753226332\smss.exe
        C:\13185753226332\smss.exe
        3⤵
        • Executes dropped EXE
        • Windows security modification
        PID:2268

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\13185753226332\smss.exe
    MD5

    e28889b5f98d8ed1a00835e1ca8a3b21

    SHA1

    b665e89468ac7ae566aa996aeec203b25bf24b0c

    SHA256

    0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73

    SHA512

    d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd

  • C:\13185753226332\smss.exe
    MD5

    e28889b5f98d8ed1a00835e1ca8a3b21

    SHA1

    b665e89468ac7ae566aa996aeec203b25bf24b0c

    SHA256

    0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73

    SHA512

    d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd

  • C:\Users\Admin\AppData\Local\Temp\3478027055.exe
    MD5

    e28889b5f98d8ed1a00835e1ca8a3b21

    SHA1

    b665e89468ac7ae566aa996aeec203b25bf24b0c

    SHA256

    0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73

    SHA512

    d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd

  • C:\Users\Admin\AppData\Local\Temp\3478027055.exe
    MD5

    e28889b5f98d8ed1a00835e1ca8a3b21

    SHA1

    b665e89468ac7ae566aa996aeec203b25bf24b0c

    SHA256

    0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73

    SHA512

    d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd

  • memory/2268-117-0x0000000000000000-mapping.dmp
  • memory/4008-114-0x0000000000000000-mapping.dmp