Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 02:05

General

  • Target

    f1cb0097c9da134b6e0df7347b802347_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    f1cb0097c9da134b6e0df7347b802347

  • SHA1

    0963094532368f1236672d247facf7b5d8db5c3b

  • SHA256

    00d7a3711f2a73a5a829d67c7beda7c05fe058ce396f9a617ec547967c442bf1

  • SHA512

    1a455e8d498a8e50edbeb8768c1693a7cd04bc3027fd02be266bc8925553f4d4acfe01aeaf0f0dc5009a388876a0b3ab64fbd3c9bc7ff25aa254c52d59bdc4eb

  • SSDEEP

    768:sV5FskQz6dDp1ODXKyX/sBJ3+seFGF3ExYE:9kA6pOD6yPAeFGFI

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.93/

http://gotsomefile.top/

http://feedmefile.top/

http://gimmefile.top/

http://tsrv3.ru/

Wallets

15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N

1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv

3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJ

bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr

XkcKjKZqNUkChwJXMj5uDjDns6etXvakir

D7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb

0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdE

LfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTG

rUQFcff9R1eKAwTtR1wbuQxmcoB236mz44

TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TB

t1gTRxsrEXwky32j22jgFRZAafBzmCV2M2V

AT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3

bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr

44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822

GBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMV

bnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgc

bc1q7tlhekvj4d3unj2lzzny5wecy5pr6vatdgcn8w

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.146 Safari/537.36

Signatures

  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1cb0097c9da134b6e0df7347b802347_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1cb0097c9da134b6e0df7347b802347_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\42852417121114\csrss.exe
      C:\42852417121114\csrss.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \42852417121114\csrss.exe

    Filesize

    33KB

    MD5

    f1cb0097c9da134b6e0df7347b802347

    SHA1

    0963094532368f1236672d247facf7b5d8db5c3b

    SHA256

    00d7a3711f2a73a5a829d67c7beda7c05fe058ce396f9a617ec547967c442bf1

    SHA512

    1a455e8d498a8e50edbeb8768c1693a7cd04bc3027fd02be266bc8925553f4d4acfe01aeaf0f0dc5009a388876a0b3ab64fbd3c9bc7ff25aa254c52d59bdc4eb