Threat name:
Phorpiex, RHADAMANTHYS, Xmrig
Alert
Classification:
troj.spyw.evad.mine
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to hide a thread from the debugger
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found hidden mapped module (file has been removed from disk)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Searches for specific processes (likely to inject)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
789307
Sample:
bN2hakskfs.exe
Startdate:
22/01/2023
Architecture:
WINDOWS
Score:
100
109
Snort IDS alert for
network traffic
2->109
111
Antivirus detection
for URL or domain
2->111
113
Antivirus detection
for dropped file
2->113
115
13 other signatures
2->115
10
bN2hakskfs.exe
17
2->10
started
15
winsvrupd.exe
2->15
started
17
powershell.exe
2->17
started
19
5 other processes
2->19
process3
dnsIp4
105
twizt.org
185.215.113.84, 49695, 49707, 49716
WHOLESALECONNECTIONSNL
Portugal
10->105
81
C:\Users\user\AppData\Local\...\200046076.scr, PE32
10->81
dropped
83
C:\Users\user\AppData\Local\...\tpp[1].exe, PE32
10->83
dropped
147
Drops PE files with
a suspicious file extension
10->147
149
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
10->149
21
200046076.scr
1
1
10->21
started
85
C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+
15->85
dropped
87
C:\Users\user\AppData\Local\...\mpnsrsgv.tmp, PE32+
15->87
dropped
151
Writes to foreign memory
regions
15->151
153
Modifies the context
of a thread in another
process (thread injection)
15->153
155
Maps a DLL or memory
area into another process
15->155
157
Sample is not signed
and drops a device driver
15->157
25
cmd.exe
15->25
started
159
Uses schtasks.exe or
at.exe to add and modify
task schedules
17->159
27
conhost.exe
17->27
started
29
WerFault.exe
19->29
started
31
conhost.exe
19->31
started
33
schtasks.exe
19->33
started
35
3 other processes
19->35
file5
161
Detected Stratum mining
protocol
105->161
signatures6
process7
file8
67
C:\Windows\syswsvdrv.exe, PE32
21->67
dropped
129
Antivirus detection
for dropped file
21->129
131
Multi AV Scanner detection
for dropped file
21->131
133
Found evasive API chain
(may stop execution
after checking mutex)
21->133
137
5 other signatures
21->137
37
syswsvdrv.exe
7
29
21->37
started
135
Query firmware table
information (likely
to detect VMs)
25->135
signatures9
process10
dnsIp11
99
185.215.113.66, 49697, 49698, 49700
WHOLESALECONNECTIONSNL
Portugal
37->99
101
95.159.48.52, 40500
INT-PDN-STE-ASSTEPDNInternalASSY
Syrian Arab Republic
37->101
103
3 other IPs or domains
37->103
69
C:\Users\user\AppData\Local\...\968231271.exe, PE32
37->69
dropped
71
C:\Users\user\AppData\...\3039025086.exe, PE32
37->71
dropped
73
C:\Users\user\AppData\Local\...\201820891.exe, PE32
37->73
dropped
75
3 other malicious files
37->75
dropped
139
Antivirus detection
for dropped file
37->139
141
Multi AV Scanner detection
for dropped file
37->141
143
Found evasive API chain
(may stop execution
after checking mutex)
37->143
145
5 other signatures
37->145
42
3039025086.exe
1
37->42
started
47
968231271.exe
15
37->47
started
49
201820891.exe
14
37->49
started
51
139866423.exe
1
37->51
started
file12
signatures13
process14
dnsIp15
107
179.43.175.195, 49704, 49709, 80
PLI-ASCH
Panama
42->107
89
C:\Users\user\AppData\...\nsis_uns3a7eab.dll, PE32+
42->89
dropped
163
Query firmware table
information (likely
to detect VMs)
42->163
165
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
42->165
167
Queries sensitive BIOS
Information (via WMI,
Win32_Bios & Win32_BaseBoard,
often done to detect
virtual machines)
42->167
177
9 other signatures
42->177
53
rundll32.exe
42->53
started
91
C:\Users\user\AppData\...\2064814352.exe, PE32+
47->91
dropped
93
C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+
47->93
dropped
169
Antivirus detection
for dropped file
47->169
171
Multi AV Scanner detection
for dropped file
47->171
173
Machine Learning detection
for dropped file
47->173
56
2064814352.exe
47->56
started
95
C:\Users\...\Windows Security Updates.exe, PE32
49->95
dropped
97
C:\Users\user\AppData\Local\...\pinf[1].exe, PE32
49->97
dropped
175
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
49->175
59
Windows Security Updates.exe
1
49->59
started
61
Windows Security Updates.exe
49->61
started
63
Windows Security Updates.exe
49->63
started
file16
signatures17
process18
file19
117
System process connects
to network (likely due
to code injection or
exploit)
53->117
119
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
53->119
121
Tries to steal Mail
credentials (via file
/ registry access)
53->121
127
2 other signatures
53->127
65
WerFault.exe
53->65
started
77
C:\Users\user\...\winsvrupd.exe, PE32+
56->77
dropped
123
Antivirus detection
for dropped file
56->123
125
Multi AV Scanner detection
for dropped file
56->125
79
C:\ProgramData\Adobe\Setup\...\setup.exe, PE32
59->79
dropped
signatures20
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.