Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 11:56
Behavioral task
behavioral1
Sample
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe
Resource
win10v2004-20240709-en
General
-
Target
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe
-
Size
79KB
-
MD5
1e8a2ed2e3f35620fb6b8c2a782a57f3
-
SHA1
e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a
-
SHA256
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879
-
SHA512
ce4dc7fdd7f81a7a127d650f9175292b287b4803d815d74b64a4e5125cff66224d75e7ecade1d9c0e42f870bdb49a78e9613b1a49675ab5bc098611b99b49ade
-
SSDEEP
1536:y3Mz8f2Z9F1nc2ZWEa5pFeStStfFPeeeeeeeeWeeeee:ZwfYFRVZWz3XtStfF
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b
THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
-
mutex
tre5eer
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Signatures
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule C:\Windows\sylsplvc.exe family_phorphiex -
Processes:
sylsplvc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe -
Executes dropped EXE 1 IoCs
Processes:
sylsplvc.exepid process 4132 sylsplvc.exe -
Processes:
sylsplvc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sylsplvc.exe" 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe -
Drops file in Windows directory 2 IoCs
Processes:
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exedescription ioc process File created C:\Windows\sylsplvc.exe 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe File opened for modification C:\Windows\sylsplvc.exe 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exesylsplvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sylsplvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exedescription pid process target process PID 4100 wrote to memory of 4132 4100 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe sylsplvc.exe PID 4100 wrote to memory of 4132 4100 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe sylsplvc.exe PID 4100 wrote to memory of 4132 4100 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe sylsplvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe"C:\Users\Admin\AppData\Local\Temp\3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\sylsplvc.exeC:\Windows\sylsplvc.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD51e8a2ed2e3f35620fb6b8c2a782a57f3
SHA1e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a
SHA2563f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879
SHA512ce4dc7fdd7f81a7a127d650f9175292b287b4803d815d74b64a4e5125cff66224d75e7ecade1d9c0e42f870bdb49a78e9613b1a49675ab5bc098611b99b49ade