Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240903-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
metasploit
windows/reverse_tcp
34.124.148.215:9070
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4BB7ckkaPTyADc8trtuwDoZxywaR4eNL5cDJ3KBjq9GraN4mUFztf7mLS7WgT7Bh7uPqpjvA4ypVwXKCJ1vvLWWAFvSmDoD
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
mmn7nnm8na
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysppvrdnvs.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x000d000000015d48-144.dat family_phorphiex -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2000 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1124-180-0x0000000000970000-0x0000000002378000-memory.dmp net_reactor behavioral1/memory/1124-185-0x0000000000970000-0x0000000002378000-memory.dmp net_reactor behavioral1/memory/1124-186-0x0000000000970000-0x0000000002378000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
pid Process 2640 meteran.exe 2784 ZinTask.exe 2416 newtpp.exe 1140 sysppvrdnvs.exe 1212 donut.exe 1124 explorer.exe -
Loads dropped DLL 13 IoCs
pid Process 2692 4363463463464363463463463.exe 2692 4363463463464363463463463.exe 2692 4363463463464363463463463.exe 2692 4363463463464363463463463.exe 2376 WerFault.exe 2376 WerFault.exe 2376 WerFault.exe 2692 4363463463464363463463463.exe 2692 4363463463464363463463463.exe 2692 4363463463464363463463463.exe 2692 4363463463464363463463463.exe 2192 Process not Found 2692 4363463463464363463463463.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" newtpp.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 raw.githubusercontent.com 15 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1124 explorer.exe 1124 explorer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysppvrdnvs.exe newtpp.exe File opened for modification C:\Windows\sysppvrdnvs.exe newtpp.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 316 sc.exe 1508 sc.exe 1192 sc.exe 756 sc.exe 1468 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2376 2784 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meteran.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZinTask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newtpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 4363463463464363463463463.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 1124 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1124 explorer.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2640 2692 4363463463464363463463463.exe 32 PID 2692 wrote to memory of 2640 2692 4363463463464363463463463.exe 32 PID 2692 wrote to memory of 2640 2692 4363463463464363463463463.exe 32 PID 2692 wrote to memory of 2640 2692 4363463463464363463463463.exe 32 PID 2692 wrote to memory of 2784 2692 4363463463464363463463463.exe 33 PID 2692 wrote to memory of 2784 2692 4363463463464363463463463.exe 33 PID 2692 wrote to memory of 2784 2692 4363463463464363463463463.exe 33 PID 2692 wrote to memory of 2784 2692 4363463463464363463463463.exe 33 PID 2784 wrote to memory of 2376 2784 ZinTask.exe 34 PID 2784 wrote to memory of 2376 2784 ZinTask.exe 34 PID 2784 wrote to memory of 2376 2784 ZinTask.exe 34 PID 2784 wrote to memory of 2376 2784 ZinTask.exe 34 PID 2692 wrote to memory of 2416 2692 4363463463464363463463463.exe 35 PID 2692 wrote to memory of 2416 2692 4363463463464363463463463.exe 35 PID 2692 wrote to memory of 2416 2692 4363463463464363463463463.exe 35 PID 2692 wrote to memory of 2416 2692 4363463463464363463463463.exe 35 PID 2416 wrote to memory of 1140 2416 newtpp.exe 36 PID 2416 wrote to memory of 1140 2416 newtpp.exe 36 PID 2416 wrote to memory of 1140 2416 newtpp.exe 36 PID 2416 wrote to memory of 1140 2416 newtpp.exe 36 PID 1140 wrote to memory of 2328 1140 sysppvrdnvs.exe 37 PID 1140 wrote to memory of 2328 1140 sysppvrdnvs.exe 37 PID 1140 wrote to memory of 2328 1140 sysppvrdnvs.exe 37 PID 1140 wrote to memory of 2328 1140 sysppvrdnvs.exe 37 PID 1140 wrote to memory of 1960 1140 sysppvrdnvs.exe 38 PID 1140 wrote to memory of 1960 1140 sysppvrdnvs.exe 38 PID 1140 wrote to memory of 1960 1140 sysppvrdnvs.exe 38 PID 1140 wrote to memory of 1960 1140 sysppvrdnvs.exe 38 PID 2328 wrote to memory of 2000 2328 cmd.exe 42 PID 2328 wrote to memory of 2000 2328 cmd.exe 42 PID 2328 wrote to memory of 2000 2328 cmd.exe 42 PID 2328 wrote to memory of 2000 2328 cmd.exe 42 PID 1960 wrote to memory of 1508 1960 cmd.exe 41 PID 1960 wrote to memory of 1508 1960 cmd.exe 41 PID 1960 wrote to memory of 1508 1960 cmd.exe 41 PID 1960 wrote to memory of 1508 1960 cmd.exe 41 PID 1960 wrote to memory of 1192 1960 cmd.exe 43 PID 1960 wrote to memory of 1192 1960 cmd.exe 43 PID 1960 wrote to memory of 1192 1960 cmd.exe 43 PID 1960 wrote to memory of 1192 1960 cmd.exe 43 PID 1960 wrote to memory of 756 1960 cmd.exe 44 PID 1960 wrote to memory of 756 1960 cmd.exe 44 PID 1960 wrote to memory of 756 1960 cmd.exe 44 PID 1960 wrote to memory of 756 1960 cmd.exe 44 PID 1960 wrote to memory of 1468 1960 cmd.exe 45 PID 1960 wrote to memory of 1468 1960 cmd.exe 45 PID 1960 wrote to memory of 1468 1960 cmd.exe 45 PID 1960 wrote to memory of 1468 1960 cmd.exe 45 PID 1960 wrote to memory of 316 1960 cmd.exe 46 PID 1960 wrote to memory of 316 1960 cmd.exe 46 PID 1960 wrote to memory of 316 1960 cmd.exe 46 PID 1960 wrote to memory of 316 1960 cmd.exe 46 PID 2692 wrote to memory of 1212 2692 4363463463464363463463463.exe 48 PID 2692 wrote to memory of 1212 2692 4363463463464363463463463.exe 48 PID 2692 wrote to memory of 1212 2692 4363463463464363463463463.exe 48 PID 2692 wrote to memory of 1212 2692 4363463463464363463463463.exe 48 PID 2692 wrote to memory of 1124 2692 4363463463464363463463463.exe 51 PID 2692 wrote to memory of 1124 2692 4363463463464363463463463.exe 51 PID 2692 wrote to memory of 1124 2692 4363463463464363463463463.exe 51 PID 2692 wrote to memory of 1124 2692 4363463463464363463463463.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Files\meteran.exe"C:\Users\Admin\AppData\Local\Temp\Files\meteran.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 523⤵
- Loads dropped DLL
- Program crash
PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe3⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\donut.exe"C:\Users\Admin\AppData\Local\Temp\Files\donut.exe"2⤵
- Executes dropped EXE
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\Files\explorer.exe"C:\Users\Admin\AppData\Local\Temp\Files\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
2.5MB
MD5dba7abdb1d2ada8cb51d1c258b1b3531
SHA1fa18a0affb277c99e71253bca5834e6fe6cd7135
SHA2563d0a544073fc4c02d5634bd33f76f9dae07d9a325340ed747bcfde51ea52e23f
SHA5120491865151140a5252a87a771f6552fd527fae3dec3c43ca0b806702e7ad4953b7d16bd1d8f275828f8b094bc337f79ed5c298beed4ec99186e4f4c3bd3cdf2a
-
Filesize
242KB
MD52a516c444620354c81fd32ef1b498d1b
SHA1961d3a6a0588e654dd72d00a3331c684cf8e627c
SHA256ee68d7deb7cefdfca66c078d6036d7aa3aa7afcc62b282999034b4a1faed890d
SHA512e8e4bc395997eb6e83e147816faf00ae959e091acba6d896b007781bdc9146157d049d958f9ff7b71a746ed681bd4dcca2fd84aac3eb76c4afe41d49e9f7bd2a
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
5.7MB
MD531a4da11164220233871e95edce2df23
SHA1e39e2b5ab3556488f0312994b89eaa79e4f6f98d
SHA256ea35a69bc4904317fe315cebc036d5495210de7f1e79b8c891b6cbabade07dbd
SHA512520b6d600497942cedea56c2232d0d7df7598598922b27d9b133ab05f1f8af8f397be5b88b89a7e12b2d83ba5c714cc9918946571379decc1ced099b4f0f7b30
-
Filesize
72KB
MD5cff64cc3e82aebd7a7e81f1633b5040e
SHA16cf68c970f9a1121ce42a6e0d2835fe2bc747ecd
SHA256cad5aec5df220f89c8a965230bc1566c7f113df846813a1e64ba38192473839b
SHA512250cd0e63cbe06b89ca76d3cb19284c40980ca0d4cc9a8a306d5a8ebccbdcb105f0b159f8f0846eb94d1f1b133f9d6f97a714a8ebcb67e56ec1984746b1e3557