Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 17:02
Behavioral task
behavioral1
Sample
0x0031000000018bf3-2.exe
Resource
win7-20241010-en
General
-
Target
0x0031000000018bf3-2.exe
-
Size
101KB
-
MD5
8a30adfbb8c9ed8170177ce8c5738fbf
-
SHA1
2d029ddd39fe81a08982dd4309a74045aa91004f
-
SHA256
72b19310a8c3cdfc23be1041eb773e6e41a08ec608e53b027b32e05a275b1da9
-
SHA512
8885308b53b8d1baab14a98ec257acac9c700f2cebe48cbb79a25e3d7133f0016ba082ec9f8397c9b1677375dd5a1d3894d813aba5947f267b44b012fa6a027f
-
SSDEEP
1536:UXOmn3OiFmav82rMA0oMMgQxJpROyWlVyTxFe4x6Dbe2n:CR38ODDdWl4NzoK2n
Malware Config
Extracted
phorphiex
http://45.93.20.18
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x000d0000000133b8-4.dat family_phorphiex -
Executes dropped EXE 2 IoCs
pid Process 1636 sysldrvcs.exe 2636 2994328098.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 sysldrvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysldrvcs.exe" 0x0031000000018bf3-2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\sysldrvcs.exe 0x0031000000018bf3-2.exe File created C:\Windows\sysldrvcs.exe 0x0031000000018bf3-2.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x0031000000018bf3-2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysldrvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2994328098.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1636 3052 0x0031000000018bf3-2.exe 30 PID 3052 wrote to memory of 1636 3052 0x0031000000018bf3-2.exe 30 PID 3052 wrote to memory of 1636 3052 0x0031000000018bf3-2.exe 30 PID 3052 wrote to memory of 1636 3052 0x0031000000018bf3-2.exe 30 PID 1636 wrote to memory of 2636 1636 sysldrvcs.exe 32 PID 1636 wrote to memory of 2636 1636 sysldrvcs.exe 32 PID 1636 wrote to memory of 2636 1636 sysldrvcs.exe 32 PID 1636 wrote to memory of 2636 1636 sysldrvcs.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0031000000018bf3-2.exe"C:\Users\Admin\AppData\Local\Temp\0x0031000000018bf3-2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\sysldrvcs.exeC:\Windows\sysldrvcs.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\2994328098.exeC:\Users\Admin\AppData\Local\Temp\2994328098.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD58a30adfbb8c9ed8170177ce8c5738fbf
SHA12d029ddd39fe81a08982dd4309a74045aa91004f
SHA25672b19310a8c3cdfc23be1041eb773e6e41a08ec608e53b027b32e05a275b1da9
SHA5128885308b53b8d1baab14a98ec257acac9c700f2cebe48cbb79a25e3d7133f0016ba082ec9f8397c9b1677375dd5a1d3894d813aba5947f267b44b012fa6a027f
-
Filesize
19KB
MD59adb4c4939743d5f3e670b4d783d38e5
SHA17c989249b99b82def352f66bc97d9403fd6e653b
SHA256be502d8d90235a3c317e97cacb55b0eb5ec2aa8c50a582ec6f0527d08e99a759
SHA5127573981af4fc4845e4af61067e4620b92aace90b4ac218a14920dc6f93bddafac92a8f7b02c61f3d41b42ba9f1aabbea3c215dc439da3e9c9dc68060c9a53ac1