Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 04:51
Behavioral task
behavioral1
Sample
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
Resource
win7-20240220-en
General
-
Target
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
-
Size
78KB
-
MD5
efc57ed49a29d9c43f780ac57d9383ea
-
SHA1
6feb772dab15a7004cccefd6e77aa47cafbb89ed
-
SHA256
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749
-
SHA512
37f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3
-
SSDEEP
1536:zITaqTFmav82AzaF1Pwr4xpimiwgaRS3B7A4HK:EutO4kwsamiRW2q4HK
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv
rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw
bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
3240914891.exe12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe3240914891.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3240914891.exe -
Executes dropped EXE 2 IoCs
Processes:
3240914891.exe1480822776.exepid process 2608 3240914891.exe 1352 1480822776.exe -
Loads dropped DLL 4 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe3240914891.exepid process 3056 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3056 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 2608 3240914891.exe 2608 3240914891.exe -
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe3240914891.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3240914891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" 3240914891.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe3240914891.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\systrlvnxs.exe" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\systrlvnxs.exe" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\systrvltns.exe" 3240914891.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\systrvltns.exe" 3240914891.exe -
Drops file in Windows directory 4 IoCs
Processes:
3240914891.exe12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process File created C:\Windows\systrvltns.exe 3240914891.exe File opened for modification C:\Windows\systrvltns.exe 3240914891.exe File created C:\Windows\systrlvnxs.exe 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe File opened for modification C:\Windows\systrlvnxs.exe 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
3240914891.exepid process 2608 3240914891.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe3240914891.exedescription pid process target process PID 3056 wrote to memory of 2608 3056 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3240914891.exe PID 3056 wrote to memory of 2608 3056 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3240914891.exe PID 3056 wrote to memory of 2608 3056 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3240914891.exe PID 3056 wrote to memory of 2608 3056 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3240914891.exe PID 2608 wrote to memory of 1352 2608 3240914891.exe 1480822776.exe PID 2608 wrote to memory of 1352 2608 3240914891.exe 1480822776.exe PID 2608 wrote to memory of 1352 2608 3240914891.exe 1480822776.exe PID 2608 wrote to memory of 1352 2608 3240914891.exe 1480822776.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe"C:\Users\Admin\AppData\Local\Temp\12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe"1⤵
- Modifies security service
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3240914891.exeC:\Users\Admin\AppData\Local\Temp\3240914891.exe2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1480822776.exeC:\Users\Admin\AppData\Local\Temp\1480822776.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\4[1]Filesize
86KB
MD5fe1e93f12cca3f7c0c897ef2084e1778
SHA1fb588491ddad8b24ea555a6a2727e76cec1fade3
SHA2562ebc4a92f4fdc27d4ab56e57058575a8b18adb076cbd30feea2ecdc8b7fcd41f
SHA51236e0524c465187ae9ad207c724aee45bcd61cfd3fa66a79f9434d24fcbadc0a743834d5e808e6041f3bd88e75deb5afd34193574f005ed97e4b17c6b0388cb93
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\1[1]Filesize
89KB
MD5908fe6989c453bc62faf18cdbdbc23d2
SHA1b89a6770ef60173c7755775cde2749101f375d65
SHA256d17bd74adb0124d1bf3c15fa565f542133876839c0d5c963817890fc1e1b177e
SHA512b3d8a2daf2a3b5f3cb7cc76bdbd67a219633135c3100505cc18b967293abf0bf39243c482607d4ef923f05eeb6ed28f97442bf5f10f083baa1bce7783e395be8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\5[1]Filesize
80KB
MD52ff2bb06682812eeb76628bfbe817fbb
SHA118e86614d0f4904e1fe97198ccda34b25aab7dae
SHA256985da56fb594bf65d8bb993e8e37cd6e78535da6c834945068040faf67e91e7d
SHA5125cd3b5a1e16202893b08c0ae70d3bcd9e7a49197ebf1ded08e01395202022b3b6c2d8837196ef0415fea6497d928b44e03544b934f8e062ddbb6c6f79fb6f440
-
C:\Users\Admin\tbtnds.datFilesize
4KB
MD5d73cf76255ed3e90e72d98d28e8eddd3
SHA1d58abac9bb8e4bb30cea4ef3ba7aa19186189fb5
SHA256bfcb5f4589729deeeb57b92842933b144322a672cfe3ce11586f1aec83472781
SHA51220ef064050ba23e5163435c595bc9c81422ca3b8ac82338ff965961a954bd9c0da9b13f489997015565908d1105784b712ccc2b3a478fe990e4b99e071bfa9b2
-
\Users\Admin\AppData\Local\Temp\3240914891.exeFilesize
89KB
MD5a1151afcffa047deb643bb06b11ceacc
SHA1537abe3abcfd2f2fc49ef1f61c0dba9ed36a1601
SHA256cf9e35157404a4c1d64395076d7f76471b3738d86b09a26b39d7d97e40c03b90
SHA512edeef562c3803a47d59ed19c8c72a22f25a18d3c6e98c202a376d152dc7d8a00bffcc1f64c3d3bb9284f409982bcb009463287e053bb7e95314d45f53ee782a0