Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2025, 17:14

General

  • Target

    0x0031000000018bf3-2.exe

  • Size

    101KB

  • MD5

    8a30adfbb8c9ed8170177ce8c5738fbf

  • SHA1

    2d029ddd39fe81a08982dd4309a74045aa91004f

  • SHA256

    72b19310a8c3cdfc23be1041eb773e6e41a08ec608e53b027b32e05a275b1da9

  • SHA512

    8885308b53b8d1baab14a98ec257acac9c700f2cebe48cbb79a25e3d7133f0016ba082ec9f8397c9b1677375dd5a1d3894d813aba5947f267b44b012fa6a027f

  • SSDEEP

    1536:UXOmn3OiFmav82rMA0oMMgQxJpROyWlVyTxFe4x6Dbe2n:CR38ODDdWl4NzoK2n

Malware Config

Extracted

Family

phorphiex

C2

http://45.93.20.18

Signatures

  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0031000000018bf3-2.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0031000000018bf3-2.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\sysldrvcs.exe
      C:\Windows\sysldrvcs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\123596989.exe
        C:\Users\Admin\AppData\Local\Temp\123596989.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\sysldrvcs.exe

    Filesize

    101KB

    MD5

    8a30adfbb8c9ed8170177ce8c5738fbf

    SHA1

    2d029ddd39fe81a08982dd4309a74045aa91004f

    SHA256

    72b19310a8c3cdfc23be1041eb773e6e41a08ec608e53b027b32e05a275b1da9

    SHA512

    8885308b53b8d1baab14a98ec257acac9c700f2cebe48cbb79a25e3d7133f0016ba082ec9f8397c9b1677375dd5a1d3894d813aba5947f267b44b012fa6a027f

  • \Users\Admin\AppData\Local\Temp\123596989.exe

    Filesize

    19KB

    MD5

    9adb4c4939743d5f3e670b4d783d38e5

    SHA1

    7c989249b99b82def352f66bc97d9403fd6e653b

    SHA256

    be502d8d90235a3c317e97cacb55b0eb5ec2aa8c50a582ec6f0527d08e99a759

    SHA512

    7573981af4fc4845e4af61067e4620b92aace90b4ac218a14920dc6f93bddafac92a8f7b02c61f3d41b42ba9f1aabbea3c215dc439da3e9c9dc68060c9a53ac1