Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/03/2025, 03:13
Behavioral task
behavioral1
Sample
abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe
Resource
win7-20240729-en
General
-
Target
abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe
-
Size
78KB
-
MD5
c6eb7e6bf6099b9717344e2138b93e43
-
SHA1
991ed21cdf93ecd52b4dcbcf0d770dc2878366a3
-
SHA256
abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a
-
SHA512
310d45c36f399a328ddf7aef94b0b48aaae8544e7db90927300a4e4a7393b424533aa73f121a5e45f9cfe4c750682fd37621ed1073fce28a3d8f94956fc60a36
-
SSDEEP
1536:vm9HCOFmav82bMaLZWfUM0cWhwpLXux5efnkzc:e5gOzxHM07ipIAfnkz
Malware Config
Extracted
phorphiex
http://185.215.113.66
http://45.93.20.18
185.215.113.66
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000120fd-4.dat family_phorphiex -
Xmrig family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/996-62-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-63-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-66-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-69-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-68-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-67-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-65-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-70-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/996-71-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 2 IoCs
flow pid Process 8 2644 2102923635.exe 8 2644 2102923635.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 8 IoCs
pid Process 2704 sysldpsvc.exe 2644 2102923635.exe 2632 142568188.exe 2892 1584715117.exe 2376 2266632183.exe 2964 1735922849.exe 480 Process not Found 1160 sysdoruhgsf.exe -
Loads dropped DLL 7 IoCs
pid Process 2704 sysldpsvc.exe 2644 2102923635.exe 2704 sysldpsvc.exe 2644 2102923635.exe 2644 2102923635.exe 2644 2102923635.exe 480 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysldpsvc.exe" abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1160 set thread context of 572 1160 sysdoruhgsf.exe 46 PID 1160 set thread context of 996 1160 sysdoruhgsf.exe 47 -
resource yara_rule behavioral1/memory/996-59-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-55-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-58-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-61-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-60-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-62-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-63-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-66-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-69-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-68-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-67-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-65-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-70-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/996-71-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysldpsvc.exe abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe File opened for modification C:\Windows\sysldpsvc.exe abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2888 sc.exe 236 sc.exe 1408 sc.exe 2872 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysldpsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2102923635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1584715117.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2964 1735922849.exe 2964 1735922849.exe 2964 1735922849.exe 2964 1735922849.exe 1160 sysdoruhgsf.exe 1160 sysdoruhgsf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 996 dwm.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2704 1712 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 29 PID 1712 wrote to memory of 2704 1712 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 29 PID 1712 wrote to memory of 2704 1712 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 29 PID 1712 wrote to memory of 2704 1712 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 29 PID 2704 wrote to memory of 2644 2704 sysldpsvc.exe 31 PID 2704 wrote to memory of 2644 2704 sysldpsvc.exe 31 PID 2704 wrote to memory of 2644 2704 sysldpsvc.exe 31 PID 2704 wrote to memory of 2644 2704 sysldpsvc.exe 31 PID 2644 wrote to memory of 2632 2644 2102923635.exe 32 PID 2644 wrote to memory of 2632 2644 2102923635.exe 32 PID 2644 wrote to memory of 2632 2644 2102923635.exe 32 PID 2644 wrote to memory of 2632 2644 2102923635.exe 32 PID 2704 wrote to memory of 2892 2704 sysldpsvc.exe 34 PID 2704 wrote to memory of 2892 2704 sysldpsvc.exe 34 PID 2704 wrote to memory of 2892 2704 sysldpsvc.exe 34 PID 2704 wrote to memory of 2892 2704 sysldpsvc.exe 34 PID 2644 wrote to memory of 2376 2644 2102923635.exe 35 PID 2644 wrote to memory of 2376 2644 2102923635.exe 35 PID 2644 wrote to memory of 2376 2644 2102923635.exe 35 PID 2644 wrote to memory of 2376 2644 2102923635.exe 35 PID 2644 wrote to memory of 2964 2644 2102923635.exe 36 PID 2644 wrote to memory of 2964 2644 2102923635.exe 36 PID 2644 wrote to memory of 2964 2644 2102923635.exe 36 PID 2644 wrote to memory of 2964 2644 2102923635.exe 36 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 572 1160 sysdoruhgsf.exe 46 PID 1160 wrote to memory of 996 1160 sysdoruhgsf.exe 47 PID 1160 wrote to memory of 996 1160 sysdoruhgsf.exe 47 PID 1160 wrote to memory of 996 1160 sysdoruhgsf.exe 47 PID 1160 wrote to memory of 996 1160 sysdoruhgsf.exe 47 PID 1160 wrote to memory of 996 1160 sysdoruhgsf.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe"C:\Users\Admin\AppData\Local\Temp\abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\sysldpsvc.exeC:\Windows\sysldpsvc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\2102923635.exeC:\Users\Admin\AppData\Local\Temp\2102923635.exe3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\142568188.exeC:\Users\Admin\AppData\Local\Temp\142568188.exe4⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\2266632183.exeC:\Users\Admin\AppData\Local\Temp\2266632183.exe4⤵
- Executes dropped EXE
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\1735922849.exeC:\Users\Admin\AppData\Local\Temp\1735922849.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "MgrDrvSvc"5⤵
- Launches sc.exe
PID:236
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "MgrDrvSvc" binpath= "C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe" start= "auto"5⤵
- Launches sc.exe
PID:1408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:2872
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "MgrDrvSvc"5⤵
- Launches sc.exe
PID:2888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1584715117.exeC:\Users\Admin\AppData\Local\Temp\1584715117.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exeC:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:572
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:996
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5024dd77c38676e6ce0a5a2201f6145de
SHA15d020adf1adb0b0c0b370df63b2b09d89df0acfb
SHA256b4553ff5d7ae98614d4856de134f49e503f046a15fc49033af3232fbeab9ed4c
SHA512a94312eaea187830c28680164d80e3e9c2f58a7b24930dc224ac52a308406ccfd56524dffaf5c3a37e6b713d1d711f1b44d99d1fb60669c8b2351bb4c9d2fc85
-
Filesize
78KB
MD5c6eb7e6bf6099b9717344e2138b93e43
SHA1991ed21cdf93ecd52b4dcbcf0d770dc2878366a3
SHA256abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a
SHA512310d45c36f399a328ddf7aef94b0b48aaae8544e7db90927300a4e4a7393b424533aa73f121a5e45f9cfe4c750682fd37621ed1073fce28a3d8f94956fc60a36
-
Filesize
53KB
MD560686a27b79838583920c9a0954104c9
SHA10c253b3c72cd5b01a9403230ff3ec9d3cdd8b71c
SHA256270149da5feb9487799083b5e76d41d3aa69afaf8f731e72e7d64c3a7c070c7e
SHA512c0a9308b5a3baca0906c9663ca3e3eaf64fc131aaa5358557874b30e4b743ffe898da6fbace032c3481693bf9081f938127fd07c8d550d9eb74958b20e24ab04
-
Filesize
19KB
MD59adb4c4939743d5f3e670b4d783d38e5
SHA17c989249b99b82def352f66bc97d9403fd6e653b
SHA256be502d8d90235a3c317e97cacb55b0eb5ec2aa8c50a582ec6f0527d08e99a759
SHA5127573981af4fc4845e4af61067e4620b92aace90b4ac218a14920dc6f93bddafac92a8f7b02c61f3d41b42ba9f1aabbea3c215dc439da3e9c9dc68060c9a53ac1
-
Filesize
13KB
MD5181921fd5d4f7e043b446392233698ee
SHA10f710714ea4c01446dcb2ea4f29256fd53633f5c
SHA256aed4ab578ba8613117a2132bee215cdc3b360a1d9f993ad937ed3eecd7e9f3e6
SHA512a04699fa408ceb79f89cf61f2bea6ab85b6d93b52989f7d5ba6bdb22964fe8bc2a19aa3e1a02b063b11f8a63f3d3582ba0a621b97d911c27e2010fe9df5c6172
-
Filesize
20KB
MD52e5f10745392643c8cf21aae4241e4cc
SHA1ad390d62e2215a37a3faf5e0cb3f0f3244452c07
SHA25644db578a4075ab126df387da3fa757f76bd3074606f3a9be21ee55ec6ac1ed29
SHA51285e63e752fc43d4b2be83628f5f8dcb288276c5369a3e940f795e87409f70473221d2d28a87f04e68c126bc0836171310d00247f240e05f4618e1f9393b132af