Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/02/2023, 12:55
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
75KB
-
MD5
770e86e91865ec221f0c83f3bb5b7ab5
-
SHA1
e5b9d575c135af12ae1a9228642548402ab755fc
-
SHA256
a1b4dc3dde2dcd561f0e2644074039b1c47b0688dd4f17ac7779dd2ffcf3fe2f
-
SHA512
ad65fb7ba4e13c2a9f492fd81cf2d04a11c6ca5204ac0ba64d581bbd358e8d254d163d6896f93807695a1c8dee88cb05bc7f7bbaac78a8ec814acb6467edc341
-
SSDEEP
1536:gh3Mz8y5D0FLcNU33CxcuxrMhenfFB3CeeeeeeeeeeeeeeeeeeeWeeeee:ZwLFLQs3vuxrPnfFB3
Malware Config
Extracted
phorphiex
http://185.215.113.66/
1Gpu5QiBqsquu71AGqHwb4Y68iwnkdGH1k
3PPJU1omRSTwxDbbfVyxh9Mm8WkiMGZviMh
37AcEVDyoPyUJUKNM3mM1UxNNvKgN6Abn5
qqlt9zzv020vtlswk5v6e90nv7hsuqz0nggp4rj5t0
Xj6orHUgmtZtPb2wGSTX2reQZJ89ZeeYYG
DRyZQqRX998DYdf7zGdTCShGcRBbxjUAbF
0x25229D09B0048F23e60c010C8eE1ae65C727e973
LhoapQ1TFjG2Fvbwn5WbM2wYcwisKRVz7x
r3j2xjQLmVa6Cg3cHZLqLNVja1x6g1AtNL
TVTrpva4J2g8SENebPar4YnfnCqwUeiX4a
t1MrdY4n3DBL3uip5Pq6tqx4doYpihJJG68
AXUqtUXyQmU8buqL5ehCLuLLHhhFrREXuw
bitcoincash:qqlt9zzv020vtlswk5v6e90nv7hsuqz0nggp4rj5t0
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
GDX4NDGHA5WKQLOI65PKPZRHSN6ZAUBRHA7BL44O5IOVMMZFZISMHTUD
bnb1zm5y3pns0ertprnvdyulz63tenlp9kc4m78v0m
bc1qdk0fquc7ug2zn7zpdyx4kasdy34t00c5r2xdup
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysagrsv.exe -
Executes dropped EXE 3 IoCs
pid Process 1724 sysagrsv.exe 1052 1552330102.exe 1928 994710111.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 sysagrsv.exe 1724 sysagrsv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysagrsv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysagrsv.exe" file.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysagrsv.exe file.exe File opened for modification C:\Windows\sysagrsv.exe file.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1928 994710111.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1724 1632 file.exe 27 PID 1632 wrote to memory of 1724 1632 file.exe 27 PID 1632 wrote to memory of 1724 1632 file.exe 27 PID 1632 wrote to memory of 1724 1632 file.exe 27 PID 1724 wrote to memory of 1052 1724 sysagrsv.exe 30 PID 1724 wrote to memory of 1052 1724 sysagrsv.exe 30 PID 1724 wrote to memory of 1052 1724 sysagrsv.exe 30 PID 1724 wrote to memory of 1052 1724 sysagrsv.exe 30 PID 1724 wrote to memory of 1928 1724 sysagrsv.exe 31 PID 1724 wrote to memory of 1928 1724 sysagrsv.exe 31 PID 1724 wrote to memory of 1928 1724 sysagrsv.exe 31 PID 1724 wrote to memory of 1928 1724 sysagrsv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\sysagrsv.exeC:\Windows\sysagrsv.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\1552330102.exeC:\Users\Admin\AppData\Local\Temp\1552330102.exe3⤵
- Executes dropped EXE
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\994710111.exeC:\Users\Admin\AppData\Local\Temp\994710111.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD503ee7b245daeebbf2ccaa1690a9fc8fc
SHA1561710d7f8c05ff5c2a3a384be5de6e023e41ac4
SHA2566bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228
SHA512f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55
-
Filesize
6KB
MD5d7a216ccedc6dc68cce28a79f5b1e198
SHA13b8df290b7e0aae76381b0859b6c2b580e421023
SHA25609d414462972f9d9ed70c7c899a30b7f493eb49494bfced414bb1da418492bf7
SHA512ed4d0c6705970c3cbef470f336f3ebf77ef963835c0dc305bbb7c86d86d13fedec5ee090b1cade64d43fa2e540280f1530b830e9171476708395ec095c9b15db
-
Filesize
75KB
MD5770e86e91865ec221f0c83f3bb5b7ab5
SHA1e5b9d575c135af12ae1a9228642548402ab755fc
SHA256a1b4dc3dde2dcd561f0e2644074039b1c47b0688dd4f17ac7779dd2ffcf3fe2f
SHA512ad65fb7ba4e13c2a9f492fd81cf2d04a11c6ca5204ac0ba64d581bbd358e8d254d163d6896f93807695a1c8dee88cb05bc7f7bbaac78a8ec814acb6467edc341
-
Filesize
75KB
MD5770e86e91865ec221f0c83f3bb5b7ab5
SHA1e5b9d575c135af12ae1a9228642548402ab755fc
SHA256a1b4dc3dde2dcd561f0e2644074039b1c47b0688dd4f17ac7779dd2ffcf3fe2f
SHA512ad65fb7ba4e13c2a9f492fd81cf2d04a11c6ca5204ac0ba64d581bbd358e8d254d163d6896f93807695a1c8dee88cb05bc7f7bbaac78a8ec814acb6467edc341
-
Filesize
6KB
MD503ee7b245daeebbf2ccaa1690a9fc8fc
SHA1561710d7f8c05ff5c2a3a384be5de6e023e41ac4
SHA2566bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228
SHA512f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55
-
Filesize
6KB
MD5d7a216ccedc6dc68cce28a79f5b1e198
SHA13b8df290b7e0aae76381b0859b6c2b580e421023
SHA25609d414462972f9d9ed70c7c899a30b7f493eb49494bfced414bb1da418492bf7
SHA512ed4d0c6705970c3cbef470f336f3ebf77ef963835c0dc305bbb7c86d86d13fedec5ee090b1cade64d43fa2e540280f1530b830e9171476708395ec095c9b15db