Analysis
-
max time kernel
150s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe
Resource
win7-20220414-en
General
-
Target
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe
-
Size
248KB
-
MD5
a995787df1dd00b8c0554d0429a0055b
-
SHA1
3e62863d7144cbdb00ebd0856c05e6c55383f5b9
-
SHA256
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889
-
SHA512
0c5eb2f92a1f5e700a9c01c36196c557ce5ab324fb7c1b214a87d8318a077de9c55e32bdb0e976e254039b95adcb058dcf2e99e394d1804a0c87acdc96ce0632
Malware Config
Extracted
phorphiex
http://193.32.161.73/
1L6sJ7pmk6EGMUoTmpdbLez9dXACcirRHh
qzgdgnfd805z83wpu04rhld0yqs4dlrd35ll0ltqql
Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i
D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M
0xa5228127395263575a4b4f532e4f132b14599d24
LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7
t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z
Signatures
-
Processes:
syspxgi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" syspxgi.exe -
Phorphiex payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1908-57-0x0000000000270000-0x000000000027B000-memory.dmp family_phorphiex behavioral1/memory/1984-66-0x00000000002D0000-0x00000000002DB000-memory.dmp family_phorphiex -
Processes:
syspxgi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syspxgi.exe -
Executes dropped EXE 1 IoCs
Processes:
syspxgi.exepid process 1984 syspxgi.exe -
Loads dropped DLL 2 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exepid process 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe -
Processes:
syspxgi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syspxgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" syspxgi.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\1955122345\\syspxgi.exe" 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\1955122345\\syspxgi.exe" 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe -
Drops file in Windows directory 3 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exedescription ioc process File opened for modification C:\Windows\1955122345\syspxgi.exe 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe File opened for modification C:\Windows\1955122345 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe File created C:\Windows\1955122345\syspxgi.exe 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exesyspxgi.exepid process 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe 1984 syspxgi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exesyspxgi.exedescription pid process Token: SeDebugPrivilege 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe Token: SeDebugPrivilege 1984 syspxgi.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exesyspxgi.exepid process 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe 1984 syspxgi.exe 1984 syspxgi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exedescription pid process target process PID 1908 wrote to memory of 1984 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe syspxgi.exe PID 1908 wrote to memory of 1984 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe syspxgi.exe PID 1908 wrote to memory of 1984 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe syspxgi.exe PID 1908 wrote to memory of 1984 1908 29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe syspxgi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe"C:\Users\Admin\AppData\Local\Temp\29c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\1955122345\syspxgi.exeC:\Windows\1955122345\syspxgi.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\1955122345\syspxgi.exeFilesize
248KB
MD5a995787df1dd00b8c0554d0429a0055b
SHA13e62863d7144cbdb00ebd0856c05e6c55383f5b9
SHA25629c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889
SHA5120c5eb2f92a1f5e700a9c01c36196c557ce5ab324fb7c1b214a87d8318a077de9c55e32bdb0e976e254039b95adcb058dcf2e99e394d1804a0c87acdc96ce0632
-
\Windows\1955122345\syspxgi.exeFilesize
248KB
MD5a995787df1dd00b8c0554d0429a0055b
SHA13e62863d7144cbdb00ebd0856c05e6c55383f5b9
SHA25629c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889
SHA5120c5eb2f92a1f5e700a9c01c36196c557ce5ab324fb7c1b214a87d8318a077de9c55e32bdb0e976e254039b95adcb058dcf2e99e394d1804a0c87acdc96ce0632
-
\Windows\1955122345\syspxgi.exeFilesize
248KB
MD5a995787df1dd00b8c0554d0429a0055b
SHA13e62863d7144cbdb00ebd0856c05e6c55383f5b9
SHA25629c5bee50ae4ae71dee17438c7833ce25eac1a7dad491703eec74cf266b0e889
SHA5120c5eb2f92a1f5e700a9c01c36196c557ce5ab324fb7c1b214a87d8318a077de9c55e32bdb0e976e254039b95adcb058dcf2e99e394d1804a0c87acdc96ce0632
-
memory/1908-54-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1908-55-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1908-56-0x0000000075FC1000-0x0000000075FC3000-memory.dmpFilesize
8KB
-
memory/1908-57-0x0000000000270000-0x000000000027B000-memory.dmpFilesize
44KB
-
memory/1908-63-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1984-60-0x0000000000000000-mapping.dmp
-
memory/1984-62-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1984-64-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1984-66-0x00000000002D0000-0x00000000002DB000-memory.dmpFilesize
44KB