Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 19:34
Behavioral task
behavioral1
Sample
061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe
Resource
win7-20240508-en
General
-
Target
061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe
-
Size
113KB
-
MD5
d54208c1d2a0c3475398fc2ee70f3e40
-
SHA1
0d17b29fe85194032ebae3fc1e7b8d614ffb20f4
-
SHA256
061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3
-
SHA512
2bd65b0c6a23727d281ec7e79f16ce48609015c63c4529546543f9221d4dcc0907dfb9e1c6fb42134bc6ee87d709f83a4a3bf36881569153c59641bb2cd4d7cc
-
SSDEEP
3072:TwoehO0gArukWMsv0+ElfFtewoehO0gArukWO:0xhO+rj+OtFtVxhO+rX
Malware Config
Extracted
phorphiex
http://185.215.113.66/
12SJv5p8xUHeiKnXPCDaKCMpqvXj7TABT5BSxGt3csz9Beuc
1A6utf8R2zfLL7X31T5QRHdQyAx16BjdFD
3PFzu8Rw8aDNhDT6d5FMrZ3ckE4dEHzogfg
3BJS4zYwrnfcJMm4xLxRcsa69ght8n6QWz
qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
XgWbWpuyPGney7hcS9vZ7eNhkj7WcvGcj8
DPcSSyFAYLu4aEB4s1Yotb8ANwtx6bZEQG
0xb899fC445a1b61Cdd62266795193203aa72351fE
LRDpmP5wHZ82LZimzWDLHVqJPDSpkM1gZ7
r1eZ7W1fmUT9tiUZwK6rr3g6RNiE4QpU1
TBdEh7r35ywUD5omutc2kDTX7rXhnFkxy5
t1T7mBRBgTYPEL9RPPBnAVgcftiWUPBFWyy
AGUqhQzF52Qwbvun5wQSrpokPtCC4b9yiX
bitcoincash:qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
43ABGVDKXksdy7UTP8aHqkRf4xAVDmKKXBYDRevAadwaLJhHzH4ubZHGLjVpLc5ZWk7TVmHbHHAWUBF78mx1YG4eNbww6fr
GCVFMTUKNLFBGHE3AHRJH4IJDRZGWOJ6JD2FQTFQAAIQR64ALD7QJHUY
bnb1rcg9mnkzna2tw4u8ughyaj6ja8feyj87hss9ky
bc1qzs2hs5dvyx04h0erq4ea72sctcre2rcwadsq2v
12SJv5p8xUHeiKnXPCDaKCMpqvXj7TABT5BSxGt3csz9Beuc
1A6utf8R2zfLL7X31T5QRHdQyAx16BjdFD
3PFzu8Rw8aDNhDT6d5FMrZ3ckE4dEHzogfg
3BJS4zYwrnfcJMm4xLxRcsa69ght8n6QWz
qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
XgWbWpuyPGney7hcS9vZ7eNhkj7WcvGcj8
DPcSSyFAYLu4aEB4s1Yotb8ANwtx6bZEQG
0xb899fC445a1b61Cdd62266795193203aa72351fE
LRDpmP5wHZ82LZimzWDLHVqJPDSpkM1gZ7
r1eZ7W1fmUT9tiUZwK6rr3g6RNiE4QpU1
TBdEh7r35ywUD5omutc2kDTX7rXhnFkxy5
t1T7mBRBgTYPEL9RPPBnAVgcftiWUPBFWyy
AGUqhQzF52Qwbvun5wQSrpokPtCC4b9yiX
bitcoincash:qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k
43ABGVDKXksdy7UTP8aHqkRf4xAVDmKKXBYDRevAadwaLJhHzH4ubZHGLjVpLc5ZWk7TVmHbHHAWUBF78mx1YG4eNbww6fr
GCVFMTUKNLFBGHE3AHRJH4IJDRZGWOJ6JD2FQTFQAAIQR64ALD7QJHUY
bnb1rcg9mnkzna2tw4u8ughyaj6ja8feyj87hss9ky
bc1qzs2hs5dvyx04h0erq4ea72sctcre2rcwadsq2v
-
mutex
5858874
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Signatures
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule C:\Windows\sysfevcs.exe family_phorphiex -
Processes:
sysfevcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysfevcs.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
sysfevcs.exe1070526408.exe1832929480.exepid process 3468 sysfevcs.exe 3368 1070526408.exe 2184 1832929480.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
sysfevcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysfevcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysfevcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysfevcs.exe" 061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe -
Drops file in Windows directory 2 IoCs
Processes:
061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exedescription ioc process File created C:\Windows\sysfevcs.exe 061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe File opened for modification C:\Windows\sysfevcs.exe 061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exesysfevcs.exe1070526408.exedescription pid process target process PID 4404 wrote to memory of 3468 4404 061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe sysfevcs.exe PID 4404 wrote to memory of 3468 4404 061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe sysfevcs.exe PID 4404 wrote to memory of 3468 4404 061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe sysfevcs.exe PID 3468 wrote to memory of 3368 3468 sysfevcs.exe 1070526408.exe PID 3468 wrote to memory of 3368 3468 sysfevcs.exe 1070526408.exe PID 3468 wrote to memory of 3368 3468 sysfevcs.exe 1070526408.exe PID 3368 wrote to memory of 2184 3368 1070526408.exe 1832929480.exe PID 3368 wrote to memory of 2184 3368 1070526408.exe 1832929480.exe PID 3368 wrote to memory of 2184 3368 1070526408.exe 1832929480.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe"C:\Users\Admin\AppData\Local\Temp\061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\sysfevcs.exeC:\Windows\sysfevcs.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\1070526408.exeC:\Users\Admin\AppData\Local\Temp\1070526408.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\1832929480.exeC:\Users\Admin\AppData\Local\Temp\1832929480.exe4⤵
- Executes dropped EXE
PID:2184
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD562a359fc04086f9293ce70140e9b72cc
SHA1125c91a4b5248316ed7a262acf936b8b4ab54a9f
SHA2566868e06c295e6335cf8a8d6c5cd56a1e9d9ecc4202b2fed9af2477b1d3f441ad
SHA5122241e3781cf099f2e36a9769602c71ccba1df0029e9b1949d0b35f529bf33b722f3db51739b6c720f7ff9e3d63e59de1815fff3753699bec7e9816eb5c3e6ac2
-
Filesize
20KB
MD55d1f5a6f5f6ea2e560c75673556e10c2
SHA1be03b3d220349f0fc856fd9548ab36cca2fea638
SHA256ff070a8f81124812406aba43a43f2ab2a0f1ca58cdfbff65705c8d1b2fe557b0
SHA5126cda9a5f0fec1e9d8afebc7d126c0ef1d4a2bf01822ee8bc494d060a1ccd9874056af0b812226c7cd895164c96bc9687c028ad6a5b4a5148fb86af2fd8af3121
-
Filesize
113KB
MD5d54208c1d2a0c3475398fc2ee70f3e40
SHA10d17b29fe85194032ebae3fc1e7b8d614ffb20f4
SHA256061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3
SHA5122bd65b0c6a23727d281ec7e79f16ce48609015c63c4529546543f9221d4dcc0907dfb9e1c6fb42134bc6ee87d709f83a4a3bf36881569153c59641bb2cd4d7cc