Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 19:34

General

  • Target

    061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe

  • Size

    113KB

  • MD5

    d54208c1d2a0c3475398fc2ee70f3e40

  • SHA1

    0d17b29fe85194032ebae3fc1e7b8d614ffb20f4

  • SHA256

    061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3

  • SHA512

    2bd65b0c6a23727d281ec7e79f16ce48609015c63c4529546543f9221d4dcc0907dfb9e1c6fb42134bc6ee87d709f83a4a3bf36881569153c59641bb2cd4d7cc

  • SSDEEP

    3072:TwoehO0gArukWMsv0+ElfFtewoehO0gArukWO:0xhO+rj+OtFtVxhO+rX

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

Wallets

12SJv5p8xUHeiKnXPCDaKCMpqvXj7TABT5BSxGt3csz9Beuc

1A6utf8R2zfLL7X31T5QRHdQyAx16BjdFD

3PFzu8Rw8aDNhDT6d5FMrZ3ckE4dEHzogfg

3BJS4zYwrnfcJMm4xLxRcsa69ght8n6QWz

qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k

XgWbWpuyPGney7hcS9vZ7eNhkj7WcvGcj8

DPcSSyFAYLu4aEB4s1Yotb8ANwtx6bZEQG

0xb899fC445a1b61Cdd62266795193203aa72351fE

LRDpmP5wHZ82LZimzWDLHVqJPDSpkM1gZ7

r1eZ7W1fmUT9tiUZwK6rr3g6RNiE4QpU1

TBdEh7r35ywUD5omutc2kDTX7rXhnFkxy5

t1T7mBRBgTYPEL9RPPBnAVgcftiWUPBFWyy

AGUqhQzF52Qwbvun5wQSrpokPtCC4b9yiX

bitcoincash:qpzj59cm0dcyxy9597x927fx0wzu75nns5lsm2452k

43ABGVDKXksdy7UTP8aHqkRf4xAVDmKKXBYDRevAadwaLJhHzH4ubZHGLjVpLc5ZWk7TVmHbHHAWUBF78mx1YG4eNbww6fr

GCVFMTUKNLFBGHE3AHRJH4IJDRZGWOJ6JD2FQTFQAAIQR64ALD7QJHUY

bnb1rcg9mnkzna2tw4u8ughyaj6ja8feyj87hss9ky

bc1qzs2hs5dvyx04h0erq4ea72sctcre2rcwadsq2v

12SJv5p8xUHeiKnXPCDaKCMpqvXj7TABT5BSxGt3csz9Beuc

1A6utf8R2zfLL7X31T5QRHdQyAx16BjdFD

Attributes
  • mutex

    5858874

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36

Signatures

  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe
    "C:\Users\Admin\AppData\Local\Temp\061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Windows\sysfevcs.exe
      C:\Windows\sysfevcs.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\1070526408.exe
        C:\Users\Admin\AppData\Local\Temp\1070526408.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Users\Admin\AppData\Local\Temp\1832929480.exe
          C:\Users\Admin\AppData\Local\Temp\1832929480.exe
          4⤵
          • Executes dropped EXE
          PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1070526408.exe

    Filesize

    10KB

    MD5

    62a359fc04086f9293ce70140e9b72cc

    SHA1

    125c91a4b5248316ed7a262acf936b8b4ab54a9f

    SHA256

    6868e06c295e6335cf8a8d6c5cd56a1e9d9ecc4202b2fed9af2477b1d3f441ad

    SHA512

    2241e3781cf099f2e36a9769602c71ccba1df0029e9b1949d0b35f529bf33b722f3db51739b6c720f7ff9e3d63e59de1815fff3753699bec7e9816eb5c3e6ac2

  • C:\Users\Admin\AppData\Local\Temp\1832929480.exe

    Filesize

    20KB

    MD5

    5d1f5a6f5f6ea2e560c75673556e10c2

    SHA1

    be03b3d220349f0fc856fd9548ab36cca2fea638

    SHA256

    ff070a8f81124812406aba43a43f2ab2a0f1ca58cdfbff65705c8d1b2fe557b0

    SHA512

    6cda9a5f0fec1e9d8afebc7d126c0ef1d4a2bf01822ee8bc494d060a1ccd9874056af0b812226c7cd895164c96bc9687c028ad6a5b4a5148fb86af2fd8af3121

  • C:\Windows\sysfevcs.exe

    Filesize

    113KB

    MD5

    d54208c1d2a0c3475398fc2ee70f3e40

    SHA1

    0d17b29fe85194032ebae3fc1e7b8d614ffb20f4

    SHA256

    061db793b90f10c1b0c42faf0729c2a6e98b49f5a32e74a9815fea354bcec7e3

    SHA512

    2bd65b0c6a23727d281ec7e79f16ce48609015c63c4529546543f9221d4dcc0907dfb9e1c6fb42134bc6ee87d709f83a4a3bf36881569153c59641bb2cd4d7cc