Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe
Resource
win7-20220414-en
General
-
Target
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe
-
Size
400KB
-
MD5
30efefe9cd1f4997b696712742162719
-
SHA1
ed2d09d53872a9d2c6614ab8cbee5b81b791f8cc
-
SHA256
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935
-
SHA512
595f91d179314f82c2ffffa90c8510f707d0de7125924ac1dee89926ee45ad37f8beb47ae59a252e2deb1f985d908899371f362a853452c158a0f45d8c67e93b
Malware Config
Extracted
phorphiex
http://185.176.27.132/inf/
19mduWVW9QphW5W2caWF84wcGVSmASRYpf
qp5d3zpgldngtzf0xg2swnqaedfhn3kmsyhk7kp0yt
Xj2EfZ34QwSskhx4aRjWjGpLpMgNQWgYeV
DRkCr8Qum86fMBT3ceyzYBAGzD8pbRZmba
0xab1b250d67d08bf73ac864ea57af8cf762a29649
LVvqtuuqxcPbmqZ7VQju6kFTmQKZ58yXH2
t1dWznNU9rPvPLhmgUQTivyFYmCk4FhDKRc
Signatures
-
Processes:
sysmqjg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sysmqjg.exe -
Phorphiex payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1856-132-0x0000000002290000-0x000000000229E000-memory.dmp family_phorphiex behavioral2/memory/3148-143-0x0000000002150000-0x000000000215E000-memory.dmp family_phorphiex -
Processes:
sysmqjg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmqjg.exe -
Executes dropped EXE 1 IoCs
Processes:
sysmqjg.exepid Process 3148 sysmqjg.exe -
Processes:
sysmqjg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmqjg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmqjg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Security = "C:\\Windows\\272373411\\sysmqjg.exe" 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Security = "C:\\Windows\\272373411\\sysmqjg.exe" 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe -
Drops file in Program Files directory 3 IoCs
Processes:
sysmqjg.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe sysmqjg.exe File opened for modification C:\Program Files\7-Zip\7zfm.exe sysmqjg.exe File opened for modification C:\Program Files\7-Zip\7zg.exe sysmqjg.exe -
Drops file in Windows directory 3 IoCs
Processes:
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exedescription ioc Process File created C:\Windows\272373411\sysmqjg.exe 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe File opened for modification C:\Windows\272373411\sysmqjg.exe 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe File opened for modification C:\Windows\272373411 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2324 3148 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exesysmqjg.exepid Process 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe 3148 sysmqjg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exesysmqjg.exedescription pid Process Token: SeDebugPrivilege 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe Token: SeDebugPrivilege 3148 sysmqjg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exesysmqjg.exepid Process 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 3148 sysmqjg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exedescription pid Process procid_target PID 1856 wrote to memory of 3148 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 80 PID 1856 wrote to memory of 3148 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 80 PID 1856 wrote to memory of 3148 1856 26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe"C:\Users\Admin\AppData\Local\Temp\26da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\272373411\sysmqjg.exeC:\Windows\272373411\sysmqjg.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 14403⤵
- Program crash
PID:2324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3148 -ip 31481⤵PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD530efefe9cd1f4997b696712742162719
SHA1ed2d09d53872a9d2c6614ab8cbee5b81b791f8cc
SHA25626da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935
SHA512595f91d179314f82c2ffffa90c8510f707d0de7125924ac1dee89926ee45ad37f8beb47ae59a252e2deb1f985d908899371f362a853452c158a0f45d8c67e93b
-
Filesize
400KB
MD530efefe9cd1f4997b696712742162719
SHA1ed2d09d53872a9d2c6614ab8cbee5b81b791f8cc
SHA25626da382934358b88380909763175433dcab69c8affe5e6e35f11a8f3318b5935
SHA512595f91d179314f82c2ffffa90c8510f707d0de7125924ac1dee89926ee45ad37f8beb47ae59a252e2deb1f985d908899371f362a853452c158a0f45d8c67e93b