Resubmissions
18-04-2024 11:23
240418-nhhhhscg6v 1018-04-2024 11:22
240418-ngsbbsbe43 1018-04-2024 11:22
240418-ngr1kacg5w 1018-04-2024 11:22
240418-ngrd2acg5v 1018-04-2024 11:22
240418-ngqgqscg5t 1018-04-2024 10:00
240418-l1qwhahg77 10Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2024 11:23
Behavioral task
behavioral1
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win10v2004-20240412-en
General
-
Target
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
-
Size
104KB
-
MD5
e28889b5f98d8ed1a00835e1ca8a3b21
-
SHA1
b665e89468ac7ae566aa996aeec203b25bf24b0c
-
SHA256
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73
-
SHA512
d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd
-
SSDEEP
3072:Xl58BV2ZjooGTb5PjMdhS3KV3/jjKwcNHjo86r8X7FS8EFc:158BIFveZjMrS3q3/jjKwcNHjo86r8r6
Malware Config
Signatures
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule C:\19297158328981\smss.exe family_phorphiex -
Processes:
smss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" smss.exe -
Executes dropped EXE 1 IoCs
Processes:
smss.exepid process 1104 smss.exe -
Processes:
smss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" smss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\19297158328981\\smss.exe" 0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000\Software\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\19297158328981\\smss.exe" 0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exedescription pid process target process PID 4660 wrote to memory of 1104 4660 0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe smss.exe PID 4660 wrote to memory of 1104 4660 0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe smss.exe PID 4660 wrote to memory of 1104 4660 0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe smss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe"C:\Users\Admin\AppData\Local\Temp\0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\19297158328981\smss.exeC:\19297158328981\smss.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\19297158328981\smss.exeFilesize
104KB
MD5e28889b5f98d8ed1a00835e1ca8a3b21
SHA1b665e89468ac7ae566aa996aeec203b25bf24b0c
SHA2560429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73
SHA512d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd