Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe
Resource
win7-20240221-en
General
-
Target
0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe
-
Size
28KB
-
MD5
adb54611fc170de9e86d31181e567db4
-
SHA1
a0a7a7cff0904b406c4304a3f0e4d1436abf6a5c
-
SHA256
0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb
-
SHA512
0ed78e809d51ef88211f275021cbba1e843cba4a22354d4cd95d5b373e3d064eddafcf1b1239acb7064e311736ba67c1eae9800e2120d0764a7a659bd9b1e0f8
-
SSDEEP
384:j5RIDVmZ6zWTmydlSAw5dTxJjWOav8U9c2yweeeeeeeeWeeeee9MMp8pIP:DYijIAWdr9a0UFTeeeeeeeeWeeeee7P
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv
rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw
bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
3334622450.exe867831972.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 867831972.exe -
Processes:
3334622450.exe867831972.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3334622450.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
7280.exe867831972.exe145814807.exe1567228940.exe3334622450.exe1225329786.exe1043821001.exe600812264.exepid process 5096 7280.exe 1816 867831972.exe 2876 145814807.exe 4664 1567228940.exe 4856 3334622450.exe 1040 1225329786.exe 856 1043821001.exe 3864 600812264.exe -
Processes:
867831972.exe3334622450.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 867831972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3334622450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3334622450.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3334622450.exe867831972.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\systrvltns.exe" 3334622450.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\systrvltns.exe" 3334622450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\systrlvnxs.exe" 867831972.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\systrlvnxs.exe" 867831972.exe -
Drops file in Windows directory 4 IoCs
Processes:
867831972.exe3334622450.exedescription ioc process File opened for modification C:\Windows\systrlvnxs.exe 867831972.exe File created C:\Windows\systrvltns.exe 3334622450.exe File opened for modification C:\Windows\systrvltns.exe 3334622450.exe File created C:\Windows\systrlvnxs.exe 867831972.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
3334622450.exepid process 4856 3334622450.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 3420 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe7280.exe867831972.exe3334622450.exedescription pid process target process PID 372 wrote to memory of 5096 372 0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe 7280.exe PID 372 wrote to memory of 5096 372 0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe 7280.exe PID 372 wrote to memory of 5096 372 0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe 7280.exe PID 5096 wrote to memory of 1816 5096 7280.exe 867831972.exe PID 5096 wrote to memory of 1816 5096 7280.exe 867831972.exe PID 5096 wrote to memory of 1816 5096 7280.exe 867831972.exe PID 1816 wrote to memory of 2876 1816 867831972.exe 145814807.exe PID 1816 wrote to memory of 2876 1816 867831972.exe 145814807.exe PID 1816 wrote to memory of 2876 1816 867831972.exe 145814807.exe PID 1816 wrote to memory of 4664 1816 867831972.exe 1567228940.exe PID 1816 wrote to memory of 4664 1816 867831972.exe 1567228940.exe PID 1816 wrote to memory of 4664 1816 867831972.exe 1567228940.exe PID 1816 wrote to memory of 4856 1816 867831972.exe 3334622450.exe PID 1816 wrote to memory of 4856 1816 867831972.exe 3334622450.exe PID 1816 wrote to memory of 4856 1816 867831972.exe 3334622450.exe PID 4856 wrote to memory of 1040 4856 3334622450.exe 1225329786.exe PID 4856 wrote to memory of 1040 4856 3334622450.exe 1225329786.exe PID 4856 wrote to memory of 1040 4856 3334622450.exe 1225329786.exe PID 4856 wrote to memory of 856 4856 3334622450.exe 1043821001.exe PID 4856 wrote to memory of 856 4856 3334622450.exe 1043821001.exe PID 4856 wrote to memory of 856 4856 3334622450.exe 1043821001.exe PID 4856 wrote to memory of 3864 4856 3334622450.exe 600812264.exe PID 4856 wrote to memory of 3864 4856 3334622450.exe 600812264.exe PID 4856 wrote to memory of 3864 4856 3334622450.exe 600812264.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe"C:\Users\Admin\AppData\Local\Temp\0549d4e5d930015a66797a046bb931f3266d3a1da327891913b9b04e44c95eeb.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7280.exe"C:\Users\Admin\AppData\Local\Temp\7280.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\867831972.exeC:\Users\Admin\AppData\Local\Temp\867831972.exe3⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\145814807.exeC:\Users\Admin\AppData\Local\Temp\145814807.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1567228940.exeC:\Users\Admin\AppData\Local\Temp\1567228940.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3334622450.exeC:\Users\Admin\AppData\Local\Temp\3334622450.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1225329786.exeC:\Users\Admin\AppData\Local\Temp\1225329786.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1043821001.exeC:\Users\Admin\AppData\Local\Temp\1043821001.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\600812264.exeC:\Users\Admin\AppData\Local\Temp\600812264.exe5⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1043821001.exeFilesize
9KB
MD55e1fff14a939e4196be610a6531f398e
SHA1e907badcbcc558476a84b8df1d8fdcc0a0e15a78
SHA2562b09602b9bcaa69b1e4b030a1e9e807cc605f43b090a7ffac5999ec95e1e5ec4
SHA5120b48fc71b2b363bec1ec309f83e1a170942c7bf0809b804976c9af8cc4d804a00369626453e19b04931a0bd629de66718af06fc52f94cd89fa256f2dd9b3b19b
-
C:\Users\Admin\AppData\Local\Temp\1225329786.exeFilesize
8KB
MD52f070b82ebdbdd85642878dae67d9aff
SHA17ca4699de2f315d6637a42a8ad7cbeec76736584
SHA2563f805c0097a0dbfc875ab0a16180d39bdc49de849687bc2906b15c2a0fefe2ab
SHA5127a2e1babca20b28c82559104781a7c72db55cfa0ef52d2c1a76e9123ce9d000f140ef0959b4add53c342cb40b743bb013f69f5a0e9dc321a71835b8a9dd7a808
-
C:\Users\Admin\AppData\Local\Temp\145814807.exeFilesize
8KB
MD5da835ecda7aa46d4740d10b378f8fc6c
SHA17cc67054686a6398f68a497e9146bead5f7470c4
SHA25643bbf7187417f542305f1fad3f71976adb1b8b14c32ac87fda4c92a4734e0595
SHA5125851f60985f8b364d73570e27efadf6c0cc8c13734c24191a753da988c8ee44a4e46da32c1796ff4c5b3b8f314c54164da00f0d120ba469bfcf76b6d27db8407
-
C:\Users\Admin\AppData\Local\Temp\1567228940.exeFilesize
9KB
MD50941af53968d11cd002f1844334f90bb
SHA1d14e793ace957196184cb1532630c19f45a18738
SHA2561330ad31cbee38ba83e8b4ffcdd8ac941b942c4abd2a5b8cd14c1778979e59c7
SHA5128d1f2426442d17f915bd6dcac803442c390ff15e670fb6d1c50425be75383f1146680f9495a0e7ee84caf2f73989b89f20ff5d99e017be870edf5e13eea9db23
-
C:\Users\Admin\AppData\Local\Temp\3334622450.exeFilesize
89KB
MD5a1151afcffa047deb643bb06b11ceacc
SHA1537abe3abcfd2f2fc49ef1f61c0dba9ed36a1601
SHA256cf9e35157404a4c1d64395076d7f76471b3738d86b09a26b39d7d97e40c03b90
SHA512edeef562c3803a47d59ed19c8c72a22f25a18d3c6e98c202a376d152dc7d8a00bffcc1f64c3d3bb9284f409982bcb009463287e053bb7e95314d45f53ee782a0
-
C:\Users\Admin\AppData\Local\Temp\600812264.exeFilesize
89KB
MD5908fe6989c453bc62faf18cdbdbc23d2
SHA1b89a6770ef60173c7755775cde2749101f375d65
SHA256d17bd74adb0124d1bf3c15fa565f542133876839c0d5c963817890fc1e1b177e
SHA512b3d8a2daf2a3b5f3cb7cc76bdbd67a219633135c3100505cc18b967293abf0bf39243c482607d4ef923f05eeb6ed28f97442bf5f10f083baa1bce7783e395be8
-
C:\Users\Admin\AppData\Local\Temp\69324246.exeFilesize
86KB
MD5fe1e93f12cca3f7c0c897ef2084e1778
SHA1fb588491ddad8b24ea555a6a2727e76cec1fade3
SHA2562ebc4a92f4fdc27d4ab56e57058575a8b18adb076cbd30feea2ecdc8b7fcd41f
SHA51236e0524c465187ae9ad207c724aee45bcd61cfd3fa66a79f9434d24fcbadc0a743834d5e808e6041f3bd88e75deb5afd34193574f005ed97e4b17c6b0388cb93
-
C:\Users\Admin\AppData\Local\Temp\7280.exeFilesize
9KB
MD562b97cf4c0abafeda36e3fc101a5a022
SHA1328fae9acff3f17df6e9dc8d6ef1cec679d4eb2b
SHA256e172537adcee1fcdc8f16c23e43a5ac82c56a0347fa0197c08be979438a534ab
SHA51232bd7062aabd25205471cec8d292b820fc2fd2479da6fb723332887fc47036570bb2d25829acb7c883ccaaab272828c8effbc78f02a3deeabb47656f4b64eb24
-
C:\Users\Admin\AppData\Local\Temp\867831972.exeFilesize
78KB
MD5efc57ed49a29d9c43f780ac57d9383ea
SHA16feb772dab15a7004cccefd6e77aa47cafbb89ed
SHA25612a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749
SHA51237f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3
-
C:\Users\Admin\tbtnds.datFilesize
4KB
MD5d73cf76255ed3e90e72d98d28e8eddd3
SHA1d58abac9bb8e4bb30cea4ef3ba7aa19186189fb5
SHA256bfcb5f4589729deeeb57b92842933b144322a672cfe3ce11586f1aec83472781
SHA51220ef064050ba23e5163435c595bc9c81422ca3b8ac82338ff965961a954bd9c0da9b13f489997015565908d1105784b712ccc2b3a478fe990e4b99e071bfa9b2
-
memory/3420-77-0x000001B3E6F90000-0x000001B3E6FA0000-memory.dmpFilesize
64KB
-
memory/3420-93-0x000001B3E7090000-0x000001B3E70A0000-memory.dmpFilesize
64KB
-
memory/3420-109-0x000001B3EF400000-0x000001B3EF401000-memory.dmpFilesize
4KB
-
memory/3420-111-0x000001B3EF430000-0x000001B3EF431000-memory.dmpFilesize
4KB
-
memory/3420-112-0x000001B3EF430000-0x000001B3EF431000-memory.dmpFilesize
4KB
-
memory/3420-113-0x000001B3EF540000-0x000001B3EF541000-memory.dmpFilesize
4KB