Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 20:09
Behavioral task
behavioral1
Sample
1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe
Resource
win7-20240903-en
General
-
Target
1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe
-
Size
88KB
-
MD5
304fad5ef338d902ad76d7f63814b6e9
-
SHA1
a29d72518054769b7aa06c74cb4251dde249cc48
-
SHA256
1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e
-
SHA512
d6d67588d7e3f489dde78c3ce11de21894a38a950ba9542ff63a0aa60a8fad2c95a8d51c65f25950ae02f75da3f0f517ad5fe50da65741d160fe2af51cf51605
-
SSDEEP
1536:wL0IbNyFmav82fp0kdP6+0MTqEjXm/D5AKHK:c0cXO3pN6+JuEjaaKHK
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysmablsvr.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000019433-4.dat family_phorphiex -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 sysmablsvr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysmablsvr.exe 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe File opened for modification C:\Windows\sysmablsvr.exe 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 292 2524 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2524 2088 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe 30 PID 2088 wrote to memory of 2524 2088 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe 30 PID 2088 wrote to memory of 2524 2088 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe 30 PID 2088 wrote to memory of 2524 2088 1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe 30 PID 2524 wrote to memory of 292 2524 sysmablsvr.exe 32 PID 2524 wrote to memory of 292 2524 sysmablsvr.exe 32 PID 2524 wrote to memory of 292 2524 sysmablsvr.exe 32 PID 2524 wrote to memory of 292 2524 sysmablsvr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe"C:\Users\Admin\AppData\Local\Temp\1efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 7643⤵
- Program crash
PID:292
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5304fad5ef338d902ad76d7f63814b6e9
SHA1a29d72518054769b7aa06c74cb4251dde249cc48
SHA2561efa6a64f673ff7c35dbc94781e9c9e7529edd1235cce22cf50a0eca1e88d51e
SHA512d6d67588d7e3f489dde78c3ce11de21894a38a950ba9542ff63a0aa60a8fad2c95a8d51c65f25950ae02f75da3f0f517ad5fe50da65741d160fe2af51cf51605