Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 21:26

General

  • Target

    PhxiScriptEngine.exe

  • Size

    154.6MB

  • MD5

    6da445a956cea76679587b9e46a70f62

  • SHA1

    e660a84e82f0635100ab3bd34b4a9c8da438d825

  • SHA256

    ea7744acc6fbe786d343bf6ad9adc9d88d0890de1ba5787dd2b6156b8a7d8a4a

  • SHA512

    9115fc2e867cbda50ffc02e14da69939d74e61e75369f8c78d48826c5586fa7616c25b7a51593e17ce2ea220de428aadadeb549a7ac548b1c0a58d24176d0537

  • SSDEEP

    1572864:/CquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:vDAgZi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe
    "C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,207,167,30,177,33,44,162,79,171,106,120,140,23,222,98,33,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,206,132,162,75,87,87,83,247,45,94,16,79,30,228,249,231,34,30,120,70,94,172,75,247,185,19,105,18,53,82,148,15,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,239,84,52,148,206,37,11,9,251,60,195,184,105,35,176,99,43,68,172,159,91,205,109,131,124,246,222,140,44,177,67,76,48,0,0,0,231,119,177,116,213,55,48,132,35,210,110,237,78,113,255,105,209,121,13,153,240,14,29,196,60,214,56,29,120,245,22,52,252,193,151,50,95,137,42,61,93,64,63,131,183,64,215,247,64,0,0,0,146,72,131,114,247,167,45,14,121,27,244,27,219,232,161,7,162,172,120,41,42,195,192,112,76,51,198,250,168,215,114,60,241,3,4,202,38,65,111,46,230,237,58,196,98,39,95,194,120,12,233,85,58,52,69,249,100,167,63,141,36,50,81,117), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:5044
    • C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe
      "C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\PhxiScriptEngine" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1872,i,4724583046271645730,8117018615102380778,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:1944
      • C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe
        "C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\PhxiScriptEngine" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2608 --field-trial-handle=1872,i,4724583046271645730,8117018615102380778,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
        2⤵
        • Checks computer location settings
        PID:3896
      • C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe
        "C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\PhxiScriptEngine" --mojo-platform-channel-handle=2152 --field-trial-handle=1872,i,4724583046271645730,8117018615102380778,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:884
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,207,167,30,177,33,44,162,79,171,106,120,140,23,222,98,33,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,39,160,112,235,25,97,177,42,180,133,138,171,190,28,173,146,191,6,239,39,11,154,179,183,162,160,232,231,54,60,245,54,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,222,53,159,47,89,3,32,88,194,170,232,115,172,92,114,224,238,166,6,26,2,236,247,57,23,131,181,31,2,1,163,248,48,0,0,0,167,121,156,241,133,120,195,166,24,11,129,14,200,197,41,70,137,47,127,152,70,136,143,31,115,91,254,207,86,105,8,154,128,26,104,119,220,51,47,91,172,70,37,72,169,232,160,69,64,0,0,0,45,166,1,31,97,39,250,210,116,231,39,214,232,231,104,201,224,150,27,63,113,223,20,81,132,138,34,65,94,126,195,111,117,99,240,43,155,255,95,54,36,8,217,53,30,123,193,97,165,100,238,114,2,28,48,135,223,249,234,217,240,52,104,207), $null, 'CurrentUser')"
          2⤵
          • An obfuscated cmd.exe command-line is typically used to evade detection.
          • Suspicious use of WriteProcessMemory
          PID:1028
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1076
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1976
        • C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe
          "C:\Users\Admin\AppData\Local\Temp\PhxiScriptEngine.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\PhxiScriptEngine" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1872,i,4724583046271645730,8117018615102380778,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1320
      • C:\Windows\system32\tasklist.exe
        tasklist
        1⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,207,167,30,177,33,44,162,79,171,106,120,140,23,222,98,33,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,39,160,112,235,25,97,177,42,180,133,138,171,190,28,173,146,191,6,239,39,11,154,179,183,162,160,232,231,54,60,245,54,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,222,53,159,47,89,3,32,88,194,170,232,115,172,92,114,224,238,166,6,26,2,236,247,57,23,131,181,31,2,1,163,248,48,0,0,0,167,121,156,241,133,120,195,166,24,11,129,14,200,197,41,70,137,47,127,152,70,136,143,31,115,91,254,207,86,105,8,154,128,26,104,119,220,51,47,91,172,70,37,72,169,232,160,69,64,0,0,0,45,166,1,31,97,39,250,210,116,231,39,214,232,231,104,201,224,150,27,63,113,223,20,81,132,138,34,65,94,126,195,111,117,99,240,43,155,255,95,54,36,8,217,53,30,123,193,97,165,100,238,114,2,28,48,135,223,249,234,217,240,52,104,207), $null, 'CurrentUser')
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:332
      • C:\Windows\system32\tasklist.exe
        tasklist
        1⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3628
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,207,167,30,177,33,44,162,79,171,106,120,140,23,222,98,33,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,206,132,162,75,87,87,83,247,45,94,16,79,30,228,249,231,34,30,120,70,94,172,75,247,185,19,105,18,53,82,148,15,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,239,84,52,148,206,37,11,9,251,60,195,184,105,35,176,99,43,68,172,159,91,205,109,131,124,246,222,140,44,177,67,76,48,0,0,0,231,119,177,116,213,55,48,132,35,210,110,237,78,113,255,105,209,121,13,153,240,14,29,196,60,214,56,29,120,245,22,52,252,193,151,50,95,137,42,61,93,64,63,131,183,64,215,247,64,0,0,0,146,72,131,114,247,167,45,14,121,27,244,27,219,232,161,7,162,172,120,41,42,195,192,112,76,51,198,250,168,215,114,60,241,3,4,202,38,65,111,46,230,237,58,196,98,39,95,194,120,12,233,85,58,52,69,249,100,167,63,141,36,50,81,117), $null, 'CurrentUser')
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1996

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        f48896adf9a23882050cdff97f610a7f

        SHA1

        4c5a610df62834d43f470cae7e851946530e3086

        SHA256

        3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

        SHA512

        16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        e86a2f4d6dec82df96431112380a87e6

        SHA1

        2dc61fae82770528bee4fe5733a8ac3396012e79

        SHA256

        dde11341854008e550d48a18f4880f7e462f5a75f0a6f8c09cf7b0761a425f3a

        SHA512

        5f127e7c81c480ad134eacfda3f5de738902b879fd4e85ddc663c050c6db748ac3f9d228ca26ddb37df06039df6741d2b774c0201388edf332fe063c464397a5

      • C:\Users\Admin\AppData\Local\Temp\998a2261-3781-4b4e-b2eb-9e537bbebdd1.tmp.node

        Filesize

        1.6MB

        MD5

        c160cb44331304544e762aac728f7046

        SHA1

        d60b88f9fbaaa74f35cab1903b8f0996131dd681

        SHA256

        8232d0975a8fe0f0d6bbffb5de7e10d3a2817d63a20e7a049b90699d021f53e6

        SHA512

        2d86ff351abfdc0401532ee6e2d8a88806322789c13a3d94fbcff1ec07cf215451f8383a582bc4fbb72f74ee22acdac9b241dac9038f605a609d2cdd712ce31d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r0q1514c.u2o.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\cookies.zip

        Filesize

        22B

        MD5

        76cdb2bad9582d23c1f6f4d868218d6c

        SHA1

        b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

        SHA256

        8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

        SHA512

        5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\PhxiScriptEngine\Network\Network Persistent State

        Filesize

        502B

        MD5

        bb029972072b3fe5b385734b1490329b

        SHA1

        c90bc580ffb4cca02e12637f700ec37a3be9954b

        SHA256

        a6fee5c2c4e18b9b307a398d1c2cdff5ae5aa79122e02b1628b36c51d977f855

        SHA512

        f9aed8b7b1e1898f9e44f082a357bf466f4f4365f4a6cb0f0dd28c4b77de463021cdd10ba3f0d56db4d90ca6d368f519c589167c73e3cf7bdb457989004df27e

      • C:\Users\Admin\AppData\Roaming\PhxiScriptEngine\Network\Network Persistent State~RFe587153.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • memory/332-17-0x00000146F9BC0000-0x00000146F9BD0000-memory.dmp

        Filesize

        64KB

      • memory/332-6-0x00000146FBDE0000-0x00000146FBE02000-memory.dmp

        Filesize

        136KB

      • memory/332-23-0x00007FFEC1BF0000-0x00007FFEC26B1000-memory.dmp

        Filesize

        10.8MB

      • memory/332-18-0x00000146F9BC0000-0x00000146F9BD0000-memory.dmp

        Filesize

        64KB

      • memory/332-16-0x00007FFEC1BF0000-0x00007FFEC26B1000-memory.dmp

        Filesize

        10.8MB

      • memory/332-19-0x00000146FC160000-0x00000146FC1B0000-memory.dmp

        Filesize

        320KB

      • memory/1320-146-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-147-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-151-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-149-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-139-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-140-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-141-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-150-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-145-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1320-148-0x000001971B8D0000-0x000001971B8D1000-memory.dmp

        Filesize

        4KB

      • memory/1996-41-0x00007FFEC1BF0000-0x00007FFEC26B1000-memory.dmp

        Filesize

        10.8MB

      • memory/1996-36-0x00007FFEC1BF0000-0x00007FFEC26B1000-memory.dmp

        Filesize

        10.8MB

      • memory/1996-37-0x0000028737CA0000-0x0000028737CB0000-memory.dmp

        Filesize

        64KB

      • memory/1996-38-0x0000028737CA0000-0x0000028737CB0000-memory.dmp

        Filesize

        64KB