Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2022 09:11

General

  • Target

    1d3c6d6b276c0e1fa559cd6e48a12da63098cc3823329db71c4dbc12fa3a2334.exe

  • Size

    76KB

  • MD5

    bd280f51fc7e46a3f9470713f5f859cc

  • SHA1

    ed748025627617facd90eaad22c36687819f7535

  • SHA256

    1d3c6d6b276c0e1fa559cd6e48a12da63098cc3823329db71c4dbc12fa3a2334

  • SHA512

    b2c7aa0f9dffda55c078570d6ea51490ef5c5e13c1e8dccab7f0f5e324d785e3610e69a2f26d897bbd82ca74b4372447f838cc1296598faed4d9ddc45013bbc2

  • SSDEEP

    1536:d3Mz8teK4zdEEP7ACU5wvclRSJytpKHaHlt5F92V:mwoKIP7q+vclR/tp3Ft5F92

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.84/twizt/

Wallets

13dJT8HaqHG3SzwEHN351NKpZHjT51LUMioPeZCuYFMn6Em2

1AFyjUHBU47bKeWD3Yv9vxFvfQCNFVhEB1

3PLCWMHvHvUKmzNKvrNxRHcpBBt841bLLRm

qraj0r42vag30v888rxrv23us6n9mwqzxqmanzrjzz

XdpMAtREQP2GiJPnhECJE17Yo47kqwxE2g

DAd39Hg29o3hXTXkCp867rWZ82QtYemBr1

0x7acBe663481E7cAB6C7b22af594A1Fa5553ddA5f

LVSQJj6WFnMzAFDZLidL19hCtTtJu1WNHy

rsJ93nxUfY9p5a1g8ZYd1w1YsHdVP3tSn1

TXGiKCawSp4VEYnXC4Eyvz8gVugh3ibZjr

t1eAsZic54jTo4V4DRPWMN4oLgSzsSSYxcw

AHZnFT4zfKU59R811DCthwxBPKuRqG2ES1

bitcoincash:qraj0r42vag30v888rxrv23us6n9mwqzxqmanzrjzz

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

GABBG3OBFC3JLJEXMFEKJMMHANGFWVPTPKUJSVOMZZGQO522AXGL7Q3P

GMinVxCfyuHFUBiuuWuaWkUBWgN1kgowfsNzjjuad7W9

bnb16yfddrq3325xuqh3070tlqsr5gr74jun7zefgz

bc1qvdu6nyvrppjtshy7rgfpkl74hkklj7plavr8je

Signatures

  • Phorphiex

    Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 6 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3c6d6b276c0e1fa559cd6e48a12da63098cc3823329db71c4dbc12fa3a2334.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3c6d6b276c0e1fa559cd6e48a12da63098cc3823329db71c4dbc12fa3a2334.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\winopdvcs.exe
      C:\Windows\winopdvcs.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Users\Admin\AppData\Local\Temp\2546213664.exe
        C:\Users\Admin\AppData\Local\Temp\2546213664.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Users\Admin\AppData\Local\Temp\3433215875.exe
          C:\Users\Admin\AppData\Local\Temp\3433215875.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell <#lipfordu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4144
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell <#oqazi#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:820
            • C:\Windows\system32\schtasks.exe
              "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
              6⤵
                PID:4640
    • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
      C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell <#lipfordu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1648
      • C:\Windows\system32\cmd.exe
        cmd /c mkdir "C:\Users\Admin\AppData\Roaming\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3776
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic PATH Win32_VideoController GET Name, VideoProcessor
          3⤵
            PID:3616
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe mrcpapowlrrgcvjb 6E3sjfZq2rJQaxvLPmXgsEqPiBiBLmVqlQRiqAROwnq+r3PgsvOI5CPEjWBkfjMBWeIX+GdZdCENkRpNNWWuUuiiT0nhr8xABS5D2B/qge2fBy16M7G/el0gdMCErX4jNqcnUz2ARFIRcMCpcOiMWItfgkpYfgbwioV0ioLoGuNMU42qRMuIsqjDs2FXseGAy1L1fh1Re+jaH/pdMkIbkcsE1vSzYIpH8WyjqEMFAlci5CLdLe97i0VD0mpaS+Gd+daXi5rj++LAHgkUTDqtbVL59AFDJZ9WYwE1hVlCLXncC2+//LOROJeHXBaIJ7E+zEF1XB8rOli3v9a2WUYdKol3fQS1Z2oPF18nYGSur3scnVljXe+vL6dRgItNbPO7
          2⤵
          • Blocklisted process makes network request
          PID:3932

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Disabling Security Tools

      2
      T1089

      Modify Registry

      3
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
        Filesize

        3KB

        MD5

        00e7da020005370a518c26d5deb40691

        SHA1

        389b34fdb01997f1de74a5a2be0ff656280c0432

        SHA256

        a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe

        SHA512

        9a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        1KB

        MD5

        57c0543153b3fdefc25f54368215ae49

        SHA1

        faa7e4b52d54b98b6f5a3ddae91142098471fbaa

        SHA256

        02601023870ac4c865e1a814771c56cd1e8c65f58cfbc1f995468cff334b861b

        SHA512

        bfb9eeb7c4e1b166f7706803cc50f584fbdff6b2660ef84b2f56d56c6ede3c93b4f62ccce213c6cd638304f04a4ddb69fa4b96a947a8a8b30d5d9e19f3fc8dde

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        1KB

        MD5

        143a478fb47996f74bbbcdaa252b9e0b

        SHA1

        288893a45c1c50f8245a32aa06dfb1ac2ff31c83

        SHA256

        6d91b6cc49e12bf850b873bfd57f591a37fe1aef5ca6e2bc8855dc866abf479b

        SHA512

        e7e2d235fc60e58fe10961515db7f1a667cc58268b8cd3066afa5e7e4de0b1217e3cb85fbe24230b3eb7ac94399fa42971772954a0c309d3cb9334b7a67f93d8

      • C:\Users\Admin\AppData\Local\Temp\2546213664.exe
        Filesize

        6KB

        MD5

        f99a026691957a1490c606890021a4db

        SHA1

        4eca65b16ce9b8284f3fc54344f8ae15b406b4e1

        SHA256

        db23276681cfb7d843bfc35b96e40dcb77b3bafcb87aa211d3fa6910da6937bd

        SHA512

        e4d9f869e4c12667a91af5792213350b9205a6fd3a2175e3af39571f2066ffa6a4b398a010497f428310b91033b4d5555835ede6669793f5cfd79ae47321421f

      • C:\Users\Admin\AppData\Local\Temp\2546213664.exe
        Filesize

        6KB

        MD5

        f99a026691957a1490c606890021a4db

        SHA1

        4eca65b16ce9b8284f3fc54344f8ae15b406b4e1

        SHA256

        db23276681cfb7d843bfc35b96e40dcb77b3bafcb87aa211d3fa6910da6937bd

        SHA512

        e4d9f869e4c12667a91af5792213350b9205a6fd3a2175e3af39571f2066ffa6a4b398a010497f428310b91033b4d5555835ede6669793f5cfd79ae47321421f

      • C:\Users\Admin\AppData\Local\Temp\3433215875.exe
        Filesize

        2.2MB

        MD5

        f6fd2a4333007f65beef7609077ec14d

        SHA1

        3740133e77fae5ee1c0ed1cb0493af5557e3562a

        SHA256

        b2c7dfbe576c1962cd647917207e957d17dbe367c36dde071054f12beac68499

        SHA512

        43c8b557b1bbfb353d4fe37d09c4dd94c7aaab9d9a6fda421144e40e81e2732df7dbd9faa67ca0e1779e787a8771fbcd9496dee2ae03530462910d1393e513d7

      • C:\Users\Admin\AppData\Local\Temp\3433215875.exe
        Filesize

        2.2MB

        MD5

        f6fd2a4333007f65beef7609077ec14d

        SHA1

        3740133e77fae5ee1c0ed1cb0493af5557e3562a

        SHA256

        b2c7dfbe576c1962cd647917207e957d17dbe367c36dde071054f12beac68499

        SHA512

        43c8b557b1bbfb353d4fe37d09c4dd94c7aaab9d9a6fda421144e40e81e2732df7dbd9faa67ca0e1779e787a8771fbcd9496dee2ae03530462910d1393e513d7

      • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
        Filesize

        2.2MB

        MD5

        d081ded7aeebd495ea24b5531168f315

        SHA1

        21db4bae653ece87474e7121a8b60d9fd08208c9

        SHA256

        6e077c8a35fb28692230158cb9d80104cad9be31c06d64eb091c4cab81669d6a

        SHA512

        45dd10bcf9bcd298060ddd6a9e8afc4a938d490db632d9b1ff2c1826975be35009b87d2d7b9a4e2869882aa41dafeb6aba23d8fd4c9d11996b5ffbc8a095c8a0

      • C:\Users\Admin\AppData\Roaming\Google\Libs\g.log
        Filesize

        226B

        MD5

        fdba80d4081c28c65e32fff246dc46cb

        SHA1

        74f809dedd1fc46a3a63ac9904c80f0b817b3686

        SHA256

        b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

        SHA512

        b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

      • C:\Windows\winopdvcs.exe
        Filesize

        76KB

        MD5

        bd280f51fc7e46a3f9470713f5f859cc

        SHA1

        ed748025627617facd90eaad22c36687819f7535

        SHA256

        1d3c6d6b276c0e1fa559cd6e48a12da63098cc3823329db71c4dbc12fa3a2334

        SHA512

        b2c7aa0f9dffda55c078570d6ea51490ef5c5e13c1e8dccab7f0f5e324d785e3610e69a2f26d897bbd82ca74b4372447f838cc1296598faed4d9ddc45013bbc2

      • C:\Windows\winopdvcs.exe
        Filesize

        76KB

        MD5

        bd280f51fc7e46a3f9470713f5f859cc

        SHA1

        ed748025627617facd90eaad22c36687819f7535

        SHA256

        1d3c6d6b276c0e1fa559cd6e48a12da63098cc3823329db71c4dbc12fa3a2334

        SHA512

        b2c7aa0f9dffda55c078570d6ea51490ef5c5e13c1e8dccab7f0f5e324d785e3610e69a2f26d897bbd82ca74b4372447f838cc1296598faed4d9ddc45013bbc2

      • memory/820-150-0x00007FFBC87A0000-0x00007FFBC9261000-memory.dmp
        Filesize

        10.8MB

      • memory/820-145-0x0000000000000000-mapping.dmp
      • memory/820-148-0x00007FFBC87A0000-0x00007FFBC9261000-memory.dmp
        Filesize

        10.8MB

      • memory/1152-135-0x0000000000000000-mapping.dmp
      • memory/1320-138-0x0000000000000000-mapping.dmp
      • memory/1648-155-0x00007FFBC87A0000-0x00007FFBC9261000-memory.dmp
        Filesize

        10.8MB

      • memory/1648-154-0x00007FFBC87A0000-0x00007FFBC9261000-memory.dmp
        Filesize

        10.8MB

      • memory/1648-152-0x0000000000000000-mapping.dmp
      • memory/2624-132-0x0000000000000000-mapping.dmp
      • memory/3616-157-0x0000000000000000-mapping.dmp
      • memory/3776-156-0x0000000000000000-mapping.dmp
      • memory/3932-159-0x00007FF6D87125D0-mapping.dmp
      • memory/3932-160-0x0000022392D40000-0x0000022392D60000-memory.dmp
        Filesize

        128KB

      • memory/3932-161-0x00007FF6D7F20000-0x00007FF6D8714000-memory.dmp
        Filesize

        8.0MB

      • memory/3932-162-0x00007FF6D7F20000-0x00007FF6D8714000-memory.dmp
        Filesize

        8.0MB

      • memory/4144-143-0x00007FFBC87A0000-0x00007FFBC9261000-memory.dmp
        Filesize

        10.8MB

      • memory/4144-142-0x00007FFBC87A0000-0x00007FFBC9261000-memory.dmp
        Filesize

        10.8MB

      • memory/4144-141-0x000002281EEA0000-0x000002281EEC2000-memory.dmp
        Filesize

        136KB

      • memory/4144-140-0x0000000000000000-mapping.dmp
      • memory/4640-149-0x0000000000000000-mapping.dmp