Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 23:54

General

  • Target

    9dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4fN.exe

  • Size

    11KB

  • MD5

    83a784716728ca579619d0e13a9f17b0

  • SHA1

    5e33ca9dab3c0df2edcd597b8b0da06c88f18f6b

  • SHA256

    9dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4f

  • SHA512

    f8218a8e977f0ec340e7139041cfff8bac4cc23bcea0c0c0d7717ead76093d45d10acd72a5846486e9348ce642f529824f1575d0d28b8d2f566c543c7c9d3bc4

  • SSDEEP

    96:ETwSV536ceoPr3mrAdFDbv1SuAIULiVK+YkJxGE9btz2qhRC7tCEX:di53VeoJ1SJ6JxTZtzthy

Malware Config

Extracted

Family

phorphiex

C2

185.215.113.66

Attributes
  • mutex

    6246464

Signatures

  • Phorphiex family
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4fN.exe
    "C:\Users\Admin\AppData\Local\Temp\9dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Users\Admin\AppData\Local\Temp\3537618908.exe
      C:\Users\Admin\AppData\Local\Temp\3537618908.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3537618908.exe

    Filesize

    20KB

    MD5

    2473392c0a773aad20da1519aa6f464b

    SHA1

    2068ffd843bb8c7c7749193f6d1c5f0a9b97b280

    SHA256

    3d33e8778ea8194d486d42784411e8528c602594abdf3e32cdcee521a10f3ce7

    SHA512

    5455866f5fc53ae48ff24222b40a264bf673102435abeac2a61ba6fcaa1de429d8f078d4d065cb5d77b96de87f343579651b718e0a60934fb9fa35818d948074