Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 16:14

General

  • Target

    5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe

  • Size

    400KB

  • MD5

    5820a8e57fa4d637879cb497a8888cc1

  • SHA1

    069d0e2bb993df8d94bfae8d7932be4aa1926ce2

  • SHA256

    25b2db6412500a86c7a47ad4d88fe9d556cf677e50214355ddc0d34a620bbaf9

  • SHA512

    086bb7b98c8e948df20dbf70a5e01a24fa8a4490923fbd8e932d20e3272b76997b182f279be2e0929c2eb05fe5971e43b9619197f9bbed99b40251d672620c57

  • SSDEEP

    768:GsNLIk+WHQYNqPH6aRdyXDjbBJ3+seF+4WOJ:kkDH+PH9dyzj7eF/

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.93/

http://gimmefile.top/

http://feedmefile.top/

http://gotsomefile.top/

Wallets

15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N

1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv

3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJ

bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr

XkcKjKZqNUkChwJXMj5uDjDns6etXvakir

D7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb

0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdE

LfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTG

rUQFcff9R1eKAwTtR1wbuQxmcoB236mz44

TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TB

t1gTRxsrEXwky32j22jgFRZAafBzmCV2M2V

AT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3

bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr

44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822

GBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMV

bnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgc

bc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36

Signatures

  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\18716363713177\spoolsv.exe
      C:\18716363713177\spoolsv.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \18716363713177\spoolsv.exe

    Filesize

    400KB

    MD5

    5820a8e57fa4d637879cb497a8888cc1

    SHA1

    069d0e2bb993df8d94bfae8d7932be4aa1926ce2

    SHA256

    25b2db6412500a86c7a47ad4d88fe9d556cf677e50214355ddc0d34a620bbaf9

    SHA512

    086bb7b98c8e948df20dbf70a5e01a24fa8a4490923fbd8e932d20e3272b76997b182f279be2e0929c2eb05fe5971e43b9619197f9bbed99b40251d672620c57