Analysis

  • max time kernel
    34s
  • max time network
    47s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 03:33

Errors

Reason
Machine shutdown

General

  • Target

    2025-03-11_954bcc6fc82b77af36387a40b490938a_icedid.exe

  • Size

    1.1MB

  • MD5

    954bcc6fc82b77af36387a40b490938a

  • SHA1

    f3de016404a27061803323a3f503b816a1e6fa53

  • SHA256

    b3462465a648d6290acf6430c9658426b917235e07a99a85a1e4e21f28501aeb

  • SHA512

    08906ab40adbe351b009bd65015d5e638d89310b98dc653f51067e0df7d1048f9ffcf8d79bc3affbce0a1aaf80be5bf91f2bdc6c91e8ff55786b8fd6d68faced

  • SSDEEP

    24576:+LEHYGGHNi+tQgSMDlWSge3Mn9iXYE/w1DbRuX4oWCZ4u0ZR:JOj8MDl3geMIw1XkXJCR

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://45.93.20.18/

Wallets

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

0xCa90599132C4D88907Bd8E046540284aa468a035

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3ESHude8zUHksQg1h6hHmzY79BS36L91Yn

CSLKveRL2zqkbV2TqiFVuW6twtpqgFajoUZLAJQTTQk2

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

Attributes
  • mutex

    g7774ddg7f3s

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Extracted

Family

phorphiex

C2

http://185.215.113.66

185.215.113.66

Signatures

  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Downloads MZ/PE file 6 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-11_954bcc6fc82b77af36387a40b490938a_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-11_954bcc6fc82b77af36387a40b490938a_icedid.exe"
    1⤵
    • Downloads MZ/PE file
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Users\Admin\AppData\Local\Temp\C66D.exe
      "C:\Users\Admin\AppData\Local\Temp\C66D.exe"
      2⤵
      • Downloads MZ/PE file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\199827144.exe
        C:\Users\Admin\AppData\Local\Temp\199827144.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\sysldpsvc.exe
          C:\Windows\sysldpsvc.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Users\Admin\AppData\Local\Temp\297101826.exe
            C:\Users\Admin\AppData\Local\Temp\297101826.exe
            5⤵
            • Downloads MZ/PE file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:464
            • C:\Users\Admin\AppData\Local\Temp\510019072.exe
              C:\Users\Admin\AppData\Local\Temp\510019072.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4576
            • C:\Users\Admin\AppData\Local\Temp\2908733565.exe
              C:\Users\Admin\AppData\Local\Temp\2908733565.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1656
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c sc delete "SrvcDrvcs" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\SrvcDrvcs" /f
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4292
                • C:\Windows\system32\sc.exe
                  sc delete "SrvcDrvcs"
                  8⤵
                  • Launches sc.exe
                  PID:2064
                • C:\Windows\system32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\SrvcDrvcs" /f
                  8⤵
                    PID:3060
              • C:\Users\Admin\AppData\Local\Temp\391214368.exe
                C:\Users\Admin\AppData\Local\Temp\391214368.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4976
                • C:\Windows\System32\conhost.exe
                  "C:\Windows\System32\conhost.exe" ""
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3024
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "winsrvcs" & exit
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2336
                    • C:\Windows\system32\schtasks.exe
                      schtasks /delete /f /tn "winsrvcs"
                      9⤵
                        PID:1760
                • C:\Users\Admin\AppData\Local\Temp\3074428603.exe
                  C:\Users\Admin\AppData\Local\Temp\3074428603.exe
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4508
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c sc delete "WinSrvcsDrv" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSrvcsDrv" /f
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3608
                    • C:\Windows\system32\sc.exe
                      sc delete "WinSrvcsDrv"
                      8⤵
                      • Launches sc.exe
                      PID:1440
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSrvcsDrv" /f
                      8⤵
                        PID:2196
                  • C:\Users\Admin\AppData\Local\Temp\55699407.exe
                    C:\Users\Admin\AppData\Local\Temp\55699407.exe
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3496
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c sc delete "WinDrvUpd" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinDrvUpd" /f
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4092
                      • C:\Windows\system32\sc.exe
                        sc delete "WinDrvUpd"
                        8⤵
                        • Launches sc.exe
                        PID:4916
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinDrvUpd" /f
                        8⤵
                          PID:3712
                  • C:\Users\Admin\AppData\Local\Temp\2572631767.exe
                    C:\Users\Admin\AppData\Local\Temp\2572631767.exe
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3412
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x33c 0x408
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1232

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\199827144.exe

            Filesize

            78KB

            MD5

            c6eb7e6bf6099b9717344e2138b93e43

            SHA1

            991ed21cdf93ecd52b4dcbcf0d770dc2878366a3

            SHA256

            abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a

            SHA512

            310d45c36f399a328ddf7aef94b0b48aaae8544e7db90927300a4e4a7393b424533aa73f121a5e45f9cfe4c750682fd37621ed1073fce28a3d8f94956fc60a36

          • C:\Users\Admin\AppData\Local\Temp\2572631767.exe

            Filesize

            11KB

            MD5

            506b2bfdb0e9a8ff96b3d9391f7f735b

            SHA1

            f533e457d00388cc874c1eaea3f92ab41f94f457

            SHA256

            97f1459391aad1ee8fb324af4f32f7c50e305fee72a90c31c6c055d44de25048

            SHA512

            f369df30569a293dbae88053c669996daa0195e6e981886bf9d788bd2afe91be06e17bea720a561758d4704cc738e87ec57dc50d0f3b498d10d57fdb2fc7d836

          • C:\Users\Admin\AppData\Local\Temp\2908733565.exe

            Filesize

            8KB

            MD5

            c44040574183a3e141f2afee1a427b7d

            SHA1

            f77780ddec6f3a4f9adf95cf641fae123b076723

            SHA256

            6c1a7c919dfa3dfbcaf6eec780f9114ca688fcf8751886b57a64d816e3ff52e9

            SHA512

            4a639e2e1e931a8ace54a38f4be0293a5fc8a480a980f0541fbdf3146064e61fe19b2a9c067c50f1211a7ed20a9a8ce389181163d0408982a904fe94de4a4f6d

          • C:\Users\Admin\AppData\Local\Temp\297101826.exe

            Filesize

            11KB

            MD5

            a22c51a6cd6ecc8e0cae11baaf8facfd

            SHA1

            dc013ff393919adbdaa58e213376025f94d90804

            SHA256

            cc36d34a249c23dd5a9bbf84a3326f7cbaf18947d7627f97b73ea1e32d8b3944

            SHA512

            0eb2bc90409719a53a51a1e1d8f1c49ef95b1daf35f6c91394608ec5fbfc7363173efc027b890231309d4cdd82a9e77a45b856560bd3f3f7591c1abb6af3a938

          • C:\Users\Admin\AppData\Local\Temp\3074428603.exe

            Filesize

            8KB

            MD5

            38c5ce383f70dc49175cc5843f017ff9

            SHA1

            4c3ae746f22a1de56b4e1a6d26b7353f39f1cdfd

            SHA256

            c69a0f757d1ac585078fe3fecb4a4a925b55f412904f581cdbcfcfa72292ada3

            SHA512

            3f418ac147d4d3acfd5830cd1085b6e87afaf02497332780eb9126bb71d35eedc6ca695ef534bcba3a220f6a3960b80d3b778787e8506bad029fb41bdbc99688

          • C:\Users\Admin\AppData\Local\Temp\391214368.exe

            Filesize

            50KB

            MD5

            64d97ceac5d0fbb39f316eb8707c5af4

            SHA1

            3114d530f716e3dc9e07d78703e0ad34256b8e1c

            SHA256

            3cef6251ea6a26aaf56f933a3ef27b6b1b20d591a3cac9816ac5d850cd3a51c9

            SHA512

            19a0468aee08521640a5934e57411f91492c6287a07bf9aa331ef5855c16f7e54ae13c678b2cf86ae363987205925e2c7c9e0cab233f6341a602b78391b3c2bb

          • C:\Users\Admin\AppData\Local\Temp\510019072.exe

            Filesize

            20KB

            MD5

            8e1104b0feb6468e533ae67640767099

            SHA1

            1071b5bb7d177537065b325c2dbad197bc29045e

            SHA256

            90390f4825a7483e19fe391dd90d387fe500b3ac80cfe262c540d980694ed493

            SHA512

            dcbfb5e6764a467a6973274942de36c6a20a6944e16c356dc648f0f3bb0f2ec3c4083a37e1d57bd2e9aff6667ed5c30954e8562d6ab8d3a6fbc6dccf30ff265a

          • C:\Users\Admin\AppData\Local\Temp\55699407.exe

            Filesize

            8KB

            MD5

            5e24b9457135b737012cde5e30cf124b

            SHA1

            58575839926a1e6ae798867bbba0ed4db088d85e

            SHA256

            d3a4c4f0557019d5fe04b57486e9ed0b9c823e9d1d137138feab200e96dd9abf

            SHA512

            7192d902a9f1a51ea34291bdcb2fc09e802148f7cc415e498c67414ef2377c796b93f11dcd6b08968ea9fa6a99b7516c9bdd297ee4cab906949d41d3cebce1ec

          • C:\Users\Admin\AppData\Local\Temp\C66D.exe

            Filesize

            10KB

            MD5

            4c52cf849be8954638925c242e0cc976

            SHA1

            949ba0061ea9dbe3b9059bb2a7b20caa74861280

            SHA256

            fa6fcf2e154c0b18b12ab86267ccd38d79cc9c27e7e261a7e9201a0a9dd9d0bb

            SHA512

            c11572dcd274bdcb5e94cf38ec36aa65e4d5605df250ee8887cd5098b044e3e2e71be3b3292118b967e27bc752b5cf5d9c8da5ac2834b7c156302c307abe123b

          • memory/1656-35-0x00000000009C0000-0x00000000009C6000-memory.dmp

            Filesize

            24KB

          • memory/3024-42-0x00000285A8950000-0x00000285A8956000-memory.dmp

            Filesize

            24KB

          • memory/3024-43-0x00000285AA450000-0x00000285AA456000-memory.dmp

            Filesize

            24KB

          • memory/3496-65-0x00000000006E0000-0x00000000006E6000-memory.dmp

            Filesize

            24KB

          • memory/4508-49-0x0000000000EF0000-0x0000000000EF6000-memory.dmp

            Filesize

            24KB