Analysis
-
max time kernel
227s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 08:13
Behavioral task
behavioral1
Sample
c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe
Resource
win7-20241023-en
General
-
Target
c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe
-
Size
11KB
-
MD5
3cb61ce448a806e79ce88d06e992cc9d
-
SHA1
0a5e460360364f1b5799df7a2168892c04156bca
-
SHA256
c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4
-
SHA512
4d36781c5986a89d3bea470341223245abbd5e71de8233f2b0a969f0a258dda908588efef34fb354684760c631acb723711108e58ec3d068222ffe692d121380
-
SSDEEP
192:d6eQ8BFOXpVfXfGhegWJJfxMLkWScZqYSi/HB6U:d6eQ8nAnOgDTxMQWSc9/6U
Malware Config
Extracted
phorphiex
http://twizt.net
Signatures
-
Phorphiex family
-
Executes dropped EXE 1 IoCs
pid Process 5432 winsvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Users\\Admin\\winsvc.exe" c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 6008 wrote to memory of 5432 6008 c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe 89 PID 6008 wrote to memory of 5432 6008 c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe 89 PID 6008 wrote to memory of 5432 6008 c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe"C:\Users\Admin\AppData\Local\Temp\c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6008 -
C:\Users\Admin\winsvc.exeC:\Users\Admin\winsvc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53cb61ce448a806e79ce88d06e992cc9d
SHA10a5e460360364f1b5799df7a2168892c04156bca
SHA256c2dcdab49f620d41cdff93c58a50c760906ea2565001145564a1491defec08f4
SHA5124d36781c5986a89d3bea470341223245abbd5e71de8233f2b0a969f0a258dda908588efef34fb354684760c631acb723711108e58ec3d068222ffe692d121380