Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-07-2022 04:50
Static task
static1
Behavioral task
behavioral1
Sample
5741eadfc89a1352c61f1ff0a5c01c06.exe
Resource
win7-20220414-en
General
-
Target
5741eadfc89a1352c61f1ff0a5c01c06.exe
-
Size
75KB
-
MD5
5741eadfc89a1352c61f1ff0a5c01c06
-
SHA1
cdff6ddd67f17385f283a0f9e8de76731f11a9b6
-
SHA256
ea500d77aabc3c9d440480002c3f1d2f2977a7f860f35260edda8a26406ca1c3
-
SHA512
08104893c726e06c6fe7687394d084365b72cf19e821be0d7a1b094c9a0d54ccea65fd01ea33a1f507680d21c6f98e62e2d765b4a0ce3b3d8d458063bd375063
Malware Config
Extracted
phorphiex
http://185.215.113.84/twizt/
12SJv5p8xUHeiKnXPCDaKCMpqvXj7TABT5BSxGt3csz9Beuc
1A6utf8R2zfLL7X31T5QRHdQyAx16BjdFD
3PFzu8Rw8aDNhDT6d5FMrZ3ckE4dEHzogfg
3BJS4zYwrnfcJMm4xLxRcsa69ght8n6QWz
qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
XgWbWpuyPGney7hcS9vZ7eNhkj7WcvGcj8
DPcSSyFAYLu4aEB4s1Yotb8ANwtx6bZEQG
0xb899fC445a1b61Cdd62266795193203aa72351fE
LRDpmP5wHZ82LZimzWDLHVqJPDSpkM1gZ7
r1eZ7W1fmUT9tiUZwK6rr3g6RNiE4QpU1
TBdEh7r35ywUD5omutc2kDTX7rXhnFkxy5
t1T7mBRBgTYPEL9RPPBnAVgcftiWUPBFWyy
AGUqhQzF52Qwbvun5wQSrpokPtCC4b9yiX
bitcoincash:qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
GCVFMTUKNLFBGHE3AHRJH4IJDRZGWOJ6JD2FQTFQAAIQR64ALD7QJHUY
bnb1rcg9mnkzna2tw4u8ughyaj6ja8feyj87hss9ky
bc1qzs2hs5dvyx04h0erq4ea72sctcre2rcwadsq2v
Signatures
-
Processes:
wcdsemgr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wcdsemgr.exe -
Executes dropped EXE 1 IoCs
Processes:
wcdsemgr.exepid process 908 wcdsemgr.exe -
Processes:
wcdsemgr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" wcdsemgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wcdsemgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5741eadfc89a1352c61f1ff0a5c01c06.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\wcdsemgr.exe" 5741eadfc89a1352c61f1ff0a5c01c06.exe -
Drops file in Windows directory 2 IoCs
Processes:
5741eadfc89a1352c61f1ff0a5c01c06.exedescription ioc process File created C:\Windows\wcdsemgr.exe 5741eadfc89a1352c61f1ff0a5c01c06.exe File opened for modification C:\Windows\wcdsemgr.exe 5741eadfc89a1352c61f1ff0a5c01c06.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5741eadfc89a1352c61f1ff0a5c01c06.exedescription pid process target process PID 1612 wrote to memory of 908 1612 5741eadfc89a1352c61f1ff0a5c01c06.exe wcdsemgr.exe PID 1612 wrote to memory of 908 1612 5741eadfc89a1352c61f1ff0a5c01c06.exe wcdsemgr.exe PID 1612 wrote to memory of 908 1612 5741eadfc89a1352c61f1ff0a5c01c06.exe wcdsemgr.exe PID 1612 wrote to memory of 908 1612 5741eadfc89a1352c61f1ff0a5c01c06.exe wcdsemgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5741eadfc89a1352c61f1ff0a5c01c06.exe"C:\Users\Admin\AppData\Local\Temp\5741eadfc89a1352c61f1ff0a5c01c06.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\wcdsemgr.exeC:\Windows\wcdsemgr.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
PID:908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD55741eadfc89a1352c61f1ff0a5c01c06
SHA1cdff6ddd67f17385f283a0f9e8de76731f11a9b6
SHA256ea500d77aabc3c9d440480002c3f1d2f2977a7f860f35260edda8a26406ca1c3
SHA51208104893c726e06c6fe7687394d084365b72cf19e821be0d7a1b094c9a0d54ccea65fd01ea33a1f507680d21c6f98e62e2d765b4a0ce3b3d8d458063bd375063
-
Filesize
75KB
MD55741eadfc89a1352c61f1ff0a5c01c06
SHA1cdff6ddd67f17385f283a0f9e8de76731f11a9b6
SHA256ea500d77aabc3c9d440480002c3f1d2f2977a7f860f35260edda8a26406ca1c3
SHA51208104893c726e06c6fe7687394d084365b72cf19e821be0d7a1b094c9a0d54ccea65fd01ea33a1f507680d21c6f98e62e2d765b4a0ce3b3d8d458063bd375063