Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 05:43

General

  • Target

    388b85eb5ecd9320a1064d7074248253_JaffaCakes118.exe

  • Size

    643KB

  • MD5

    388b85eb5ecd9320a1064d7074248253

  • SHA1

    f863380c12b20e8a61c506dc02f6861b66093aa4

  • SHA256

    68657be04f5b550fec4671437e5dc5849408eada96f5ff44cb0972b0e28ca5be

  • SHA512

    ed095b0e047aeadf7df97ca8b41807feff70c34e3c256e4cd0336235811fd1102514da133810dd364a4473cb0085cf7f6dce254b5a0b95f254f2728185dcb465

  • SSDEEP

    6144:szEVDCe1/nxlwa7WAj095ZnV/0Aw2zoYOqrW54aUsN4nNkDB8qU9xyuB+B:szUDD/xlwKWA4Vg5q2UsN49qU9KB

Malware Config

Extracted

Family

phorphiex

C2

http://88.218.16.27/

http://tldrbox.top/

http://ghiehigeahghehg.ru/

http://aeouhefuehfuehf.ru/

http://uefuueahhfuuaht.ru/

http://afheaufuehafhhg.ru/

http://afaeufuegfugfug.ru/

http://fahfihhefihaehf.ru/

http://fuegufaefuegfgr.ru/

http://feufhuehfhufuhg.ru/

http://efieifihihdihhg.ru/

http://aefihiehfheihfh.ru/

http://aefihaeifhefihh.ru/

http://eafuefiuaihfief.ru/

http://egesgshretteztz.ru/

http://egohoshgsrhoror.ru/

http://eihehgeojfurrie.ru/

http://etehteirhehrihh.ru/

http://wegihwehwhhirht.ru/

http://wiiwurtiwrutiut.ru/

Wallets

1DhR14ZJtGzfdeemj49Jje6D3ZHEZQh6P3

3EzR2S3wTiiyokZE9bvY82FZiPA5m45SAC

qz95vtk4m2rw0lh7dqzlte7yasxrun47svq32p2w08

Xj2wdxqZ1pBadtPkc1mmF24QExHrZASNj6

DDhtw2BZwE12tVyQrrHFWA7u1aeD4bfa58

0xAc9A31bB9E9A3887FfC9513a93dd6da7EC648345

MJU87911Csqcutpza84nEQ2wZNn6X2b7iV

t1Lp6Cy2d63yV5H1n2LQrJwEgLXuVho43PA

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Phorphiex

    Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Phorphiex payload 2 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\388b85eb5ecd9320a1064d7074248253_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\388b85eb5ecd9320a1064d7074248253_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\266991539317428\svchost.exe
      C:\Windows\266991539317428\svchost.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      PID:4708

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\266991539317428\svchost.exe
    Filesize

    643KB

    MD5

    388b85eb5ecd9320a1064d7074248253

    SHA1

    f863380c12b20e8a61c506dc02f6861b66093aa4

    SHA256

    68657be04f5b550fec4671437e5dc5849408eada96f5ff44cb0972b0e28ca5be

    SHA512

    ed095b0e047aeadf7df97ca8b41807feff70c34e3c256e4cd0336235811fd1102514da133810dd364a4473cb0085cf7f6dce254b5a0b95f254f2728185dcb465

  • memory/372-0-0x0000000002A80000-0x0000000002AA0000-memory.dmp
    Filesize

    128KB

  • memory/372-7-0x0000000002A80000-0x0000000002AA0000-memory.dmp
    Filesize

    128KB

  • memory/372-6-0x00000000006F0000-0x00000000007FB000-memory.dmp
    Filesize

    1.0MB

  • memory/4708-8-0x0000000004940000-0x0000000004960000-memory.dmp
    Filesize

    128KB

  • memory/4708-9-0x00000000007F0000-0x00000000008FB000-memory.dmp
    Filesize

    1.0MB