Analysis
-
max time kernel
70s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 05:26
Static task
static1
Behavioral task
behavioral1
Sample
b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe
Resource
win7-20220414-en
General
-
Target
b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe
-
Size
340KB
-
MD5
c73cff9e8afd69413185adb5b1ee319b
-
SHA1
fd0a136d08ede4cb79258252c423de43e1e6f961
-
SHA256
b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
-
SHA512
cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
Malware Config
Extracted
phorphiex
http://193.32.161.73/
1Bn4JYKoVgQpZ73doWVFSNZBbwKj3cpJNR
qqsagteh4m6qunmgrrknulafzcdlmzn35yeggvq8qk
Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i
D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M
0x05F916216CC4BA6ac89b8093d474E2a1e6121c63
LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7
t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sysqwxk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sysqwxk.exe -
Phorphiex payload 2 IoCs
resource yara_rule behavioral1/memory/1668-56-0x00000000003F0000-0x00000000003FD000-memory.dmp family_phorphiex behavioral1/memory/1544-68-0x0000000000390000-0x000000000039D000-memory.dmp family_phorphiex -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysqwxk.exe -
Executes dropped EXE 1 IoCs
pid Process 1544 sysqwxk.exe -
Loads dropped DLL 7 IoCs
pid Process 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysqwxk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysqwxk.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\455421453\\sysqwxk.exe" b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\455421453\\sysqwxk.exe" b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe sysqwxk.exe File opened for modification C:\Program Files\7-Zip\7zfm.exe sysqwxk.exe File opened for modification C:\Program Files\7-Zip\7zg.exe sysqwxk.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\455421453\sysqwxk.exe b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe File opened for modification C:\Windows\455421453\sysqwxk.exe b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe File opened for modification C:\Windows\455421453 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1724 1544 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe 1544 sysqwxk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe Token: SeDebugPrivilege 1544 sysqwxk.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 1544 sysqwxk.exe 1544 sysqwxk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1544 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 28 PID 1668 wrote to memory of 1544 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 28 PID 1668 wrote to memory of 1544 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 28 PID 1668 wrote to memory of 1544 1668 b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe 28 PID 1544 wrote to memory of 1724 1544 sysqwxk.exe 31 PID 1544 wrote to memory of 1724 1544 sysqwxk.exe 31 PID 1544 wrote to memory of 1724 1544 sysqwxk.exe 31 PID 1544 wrote to memory of 1724 1544 sysqwxk.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe"C:\Users\Admin\AppData\Local\Temp\b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\455421453\sysqwxk.exeC:\Windows\455421453\sysqwxk.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 18043⤵
- Loads dropped DLL
- Program crash
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41
-
Filesize
340KB
MD5c73cff9e8afd69413185adb5b1ee319b
SHA1fd0a136d08ede4cb79258252c423de43e1e6f961
SHA256b21161366811a20b0ea91afb9d3559828aa2e1480455ef9b42afb01d1fff104f
SHA512cd7196797b00d58bea070260b28824b6852c9f13d9791ee84123b0606d606bc51e2c605bd9a2508ad0cdc510403c77cc3b084bf7491f97892db1e4b093674a41