Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe
Resource
win7-20240903-en
General
-
Target
544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe
-
Size
26.1MB
-
MD5
221efb4a5fa8ac017bf3918669495e83
-
SHA1
682b7b9d1a0868625b3c358c73fa99024fbb114f
-
SHA256
544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026
-
SHA512
2ce0707c3535277652720dc866c6b7476969c887b6faa8acb555af8966460bb39ebed0c5fa8c672e41c37a850186847e7da2ac42ea16ca2dca97f903b736a87b
-
SSDEEP
393216:H/4u+DepixkkahO/Ria/mMZGhK13BLwk2YFr287+jX9Zmgr7nPvkA61EXwc7yhNO:f4u+SPfk/1kG19FNkygnPvks7yhAxtNh
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1776 mralfdjn.exe 2872 LineInst.exe 15488 Phxph.exe 8540 Phxph.exe -
Loads dropped DLL 8 IoCs
pid Process 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Phxph.exe File opened (read-only) \??\L: Phxph.exe File opened (read-only) \??\N: Phxph.exe File opened (read-only) \??\S: Phxph.exe File opened (read-only) \??\T: Phxph.exe File opened (read-only) \??\V: Phxph.exe File opened (read-only) \??\W: Phxph.exe File opened (read-only) \??\J: Phxph.exe File opened (read-only) \??\M: Phxph.exe File opened (read-only) \??\R: Phxph.exe File opened (read-only) \??\U: Phxph.exe File opened (read-only) \??\Y: Phxph.exe File opened (read-only) \??\B: Phxph.exe File opened (read-only) \??\E: Phxph.exe File opened (read-only) \??\G: Phxph.exe File opened (read-only) \??\H: Phxph.exe File opened (read-only) \??\O: Phxph.exe File opened (read-only) \??\Q: Phxph.exe File opened (read-only) \??\X: Phxph.exe File opened (read-only) \??\K: Phxph.exe File opened (read-only) \??\P: Phxph.exe File opened (read-only) \??\Z: Phxph.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Phxph.exe mralfdjn.exe File opened for modification C:\Windows\SysWOW64\Phxph.exe mralfdjn.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 1776 mralfdjn.exe 1776 mralfdjn.exe 1776 mralfdjn.exe 15488 Phxph.exe 1776 mralfdjn.exe 15488 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mralfdjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phxph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phxph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 8500 cmd.exe 3348 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Phxph.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Phxph.exe -
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Phxph.exe Key created \REGISTRY\USER\.DEFAULT\Software Phxph.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie Phxph.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum Phxph.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Phxph.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Phxph.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Phxph.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft Phxph.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" Phxph.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Phxph.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Phxph.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Phxph.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3348 PING.EXE -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe 8540 Phxph.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1776 mralfdjn.exe Token: 33 8540 Phxph.exe Token: SeIncBasePriorityPrivilege 8540 Phxph.exe Token: 33 8540 Phxph.exe Token: SeIncBasePriorityPrivilege 8540 Phxph.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1776 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 30 PID 1076 wrote to memory of 1776 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 30 PID 1076 wrote to memory of 1776 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 30 PID 1076 wrote to memory of 1776 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 30 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 1076 wrote to memory of 2872 1076 544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe 31 PID 15488 wrote to memory of 8540 15488 Phxph.exe 35 PID 15488 wrote to memory of 8540 15488 Phxph.exe 35 PID 15488 wrote to memory of 8540 15488 Phxph.exe 35 PID 15488 wrote to memory of 8540 15488 Phxph.exe 35 PID 1776 wrote to memory of 8500 1776 mralfdjn.exe 34 PID 1776 wrote to memory of 8500 1776 mralfdjn.exe 34 PID 1776 wrote to memory of 8500 1776 mralfdjn.exe 34 PID 1776 wrote to memory of 8500 1776 mralfdjn.exe 34 PID 8500 wrote to memory of 3348 8500 cmd.exe 37 PID 8500 wrote to memory of 3348 8500 cmd.exe 37 PID 8500 wrote to memory of 3348 8500 cmd.exe 37 PID 8500 wrote to memory of 3348 8500 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe"C:\Users\Admin\AppData\Local\Temp\544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\mralfdjn.exe"C:\Users\Admin\AppData\Local\Temp\mralfdjn.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\mralfdjn.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:8500 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\LineInst.exe"C:\Users\Admin\AppData\Local\Temp\LineInst.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\Phxph.exeC:\Windows\SysWOW64\Phxph.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:15488 -
C:\Windows\SysWOW64\Phxph.exeC:\Windows\SysWOW64\Phxph.exe -acsi2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD53e7186781b9393bdb84477fc025e995c
SHA1727c10bf95ece9c41ccc68b72d75457fc2989015
SHA256a8525190ad6b567760a210cfd5cdf6e163a1391173f0f4dba1d2bf18f5ac46d8
SHA512d0dfcc0d9ed4c7ee29696bb4dde3e8fad6de6b850f2e50b809dd12cfb6ca9bdae7c912bd81089b05fd7dc302a671b32415c5610f3a2740cd6fbad8ddf677fe0a
-
Filesize
1004KB
MD5587e3bc21efaf428c87331decc9bfeb3
SHA1a5b8ebeab4e3968673a61a95350b7f0bf60d7459
SHA256b931c5686cc09b2183bba197dc151b8e95ca6151e39fb98954352340c0b31120
SHA512ffae2dab5caf16dc7dfd0a97a8ff6349a466bc57ee043d1ac4d53e011498e39b9a855295d10207ba578c6857abebd445d378e83aa2ff6ec247713d81b370d0ca
-
Filesize
27.3MB
MD5f9d4a4c93c769108a010dd8a1c7f3cdb
SHA1544448693eda94e35201ee220294250c4bbe9a51
SHA256fea7547e78ba91f0b72162ce9a4ec2f419446c57fa008fffe4c92eadc594aab0
SHA5121f362c032469027da4d7852315174cc4535cafc635790f8ef51ebbfaa84b46bfbe5abf6975c858e134d76995c6948fcc64113a9d5be51a2626dabd6bf7be14c3