General
-
Target
84eaf3c48a49c2604f28a9b9ef6ce47df9aef7c8d1b7da710dd6c34d1a4d05ceN
-
Size
10KB
-
Sample
241030-qvw8jssret
-
MD5
005c3132eec6d97710f943f451006b50
-
SHA1
0729c5137b1df9c0cb6c6df783c3e9f601dd9a0e
-
SHA256
84eaf3c48a49c2604f28a9b9ef6ce47df9aef7c8d1b7da710dd6c34d1a4d05ce
-
SHA512
19610f2c10f2dcb8fb09bea9af2457ce74fed7ba7ab57186018112d9b7a23b686317724756a2a8ccbcc6e3c4620811702b03c47726149d5ac41a3c39cf677d0c
-
SSDEEP
96:SPX8jFyRW/k60KzTX7y8uQdtJDoy9+tQKdPiW0ffli/dq1JxGEh32qhlC7tCE5gI:SPXAyRl6BO8j9+6KBB/gJxTh3thW5gV
Static task
static1
Behavioral task
behavioral1
Sample
84eaf3c48a49c2604f28a9b9ef6ce47df9aef7c8d1b7da710dd6c34d1a4d05ceN.exe
Resource
win7-20241010-en
Malware Config
Extracted
phorphiex
http://185.215.113.84
Targets
-
-
Target
84eaf3c48a49c2604f28a9b9ef6ce47df9aef7c8d1b7da710dd6c34d1a4d05ceN
-
Size
10KB
-
MD5
005c3132eec6d97710f943f451006b50
-
SHA1
0729c5137b1df9c0cb6c6df783c3e9f601dd9a0e
-
SHA256
84eaf3c48a49c2604f28a9b9ef6ce47df9aef7c8d1b7da710dd6c34d1a4d05ce
-
SHA512
19610f2c10f2dcb8fb09bea9af2457ce74fed7ba7ab57186018112d9b7a23b686317724756a2a8ccbcc6e3c4620811702b03c47726149d5ac41a3c39cf677d0c
-
SSDEEP
96:SPX8jFyRW/k60KzTX7y8uQdtJDoy9+tQKdPiW0ffli/dq1JxGEh32qhlC7tCE5gI:SPXAyRl6BO8j9+6KBB/gJxTh3thW5gV
-
Modifies security service
-
Phorphiex family
-
Phorphiex payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1