Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
syscceb.exe
Resource
win7-20240903-en
General
-
Target
syscceb.exe
-
Size
480KB
-
MD5
34e58603627f492a9602130f25025f96
-
SHA1
ded14cfd26427f6d57721560f90fbbd288a98551
-
SHA256
80a2f5e6f0d6e2577808ccd5b850ddb8703573422fe72539c344bcc16f82e4df
-
SHA512
b0938c35699021b67d4f44acca6417c0fe4404aa8e190689d080ecb7381825053d7e5151cc1c7575e5cc3cc27207545ed2a6c5a325bfa1d377aad468e3dd28fe
-
SSDEEP
12288:ziTWzHoGfF4MRqtg681Xb7nEyOX6JryOAxAa:zvfF4K7D53nyX6S5
Malware Config
Extracted
phorphiex
http://185.176.27.132/
http://urusurofhsorhfuuhk.su/
http://aeifaeifhutuhuhusk.su/
http://rzhsudhugugfugugsk.su/
http://bfagzzezgaegzgfaik.su/
http://eaeuafhuaegfugeudk.su/
http://aeufuaehfiuehfuhfk.su/
http://daedagheauehfuuhfk.su/
http://aeoughaoheguaoehdk.su/
http://eguaheoghouughahsk.su/
http://huaeokaefoaeguaehk.su/
http://afaeigaifgsgrhhafk.su/
http://afaigaeigieufuifik.su/
http://geauhouefheuutiiik.su/
http://gaoheeuofhefefhutk.su/
http://gaouehaehfoaeajrsk.su/
http://gaohrhurhuhruhfsdk.su/
http://gaghpaheiafhjefijk.su/
http://gaoehuoaoefhuhfugk.su/
http://aegohaohuoruitiiek.su/
http://befaheaiudeuhughgk.su/
http://urusurofhsorhfuuho.io/
http://aeifaeifhutuhuhuso.io/
http://rzhsudhugugfugugso.io/
13cQ2H6oszrEnvw1ZGdsPix9gUayB8tzNa
qr5pm4d27z250wpz4sfy08ytghxn56kryvsw5tdw99
XfrM8P9YWSg8mQTxSCCxyHUeQjMEGx8vnE
DSG5PddW9wu1eKdLcx4f3KBF4wUvaBFaGc
0x373b9854c9e4511b920372f5495640cdc25d6832
LSermtCTLWeS683x17AtYuhNT8MpMmVmi8
t1XgRHyGj6YDNqkS5EWwdcXG1rjQPFFdUsR
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" syscceb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" syscceb.exe -
Phorphiex family
-
Phorphiex payload 3 IoCs
resource yara_rule behavioral2/memory/4656-2-0x00000000023D0000-0x00000000023DE000-memory.dmp family_phorphiex behavioral2/memory/4656-4-0x00000000023D0000-0x00000000023DE000-memory.dmp family_phorphiex behavioral2/memory/4656-6-0x00000000023D0000-0x00000000023DE000-memory.dmp family_phorphiex -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" syscceb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscceb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscceb.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syscceb.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe 4656 syscceb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4656 syscceb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4656 syscceb.exe 4656 syscceb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\syscceb.exe"C:\Users\Admin\AppData\Local\Temp\syscceb.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4656