Behavioral task
behavioral1
Sample
f4c71bb6e0a66271e2341c1b75468babee40a3fd382165b95dcf6ed47158a9dc_unpacked.exe
Resource
win7-20220812-en
General
-
Target
f4c71bb6e0a66271e2341c1b75468babee40a3fd382165b95dcf6ed47158a9dc_unpacked
-
Size
46KB
-
MD5
41a01146794b659a495ba72e5e000fd9
-
SHA1
f9339bdba236f23b5fd80f5f8b857c85ace6e9f7
-
SHA256
120b39312b1b3b47fef7aa11f655e9e73ea2c00e09a035e4229bf535caa9f50c
-
SHA512
a279c85b24af1992f01dff8a191dd7e350b6d33a4b9712f68ca314e7beaa935276ebc46d5857ce7dc1483df36281e17d6417080f644229335cd5d6f5b0cdc26a
-
SSDEEP
768:umULbLyP1PMO3TV/V2OwdVgoJ4z6/3Ywp2JcGU7Uz3Lgs:LU3WP153h/V2OsG2J/39AT3Lp
Malware Config
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule sample family_phorphiex
Files
-
f4c71bb6e0a66271e2341c1b75468babee40a3fd382165b95dcf6ed47158a9dc_unpacked.exe windows x86
94935ce16c3abfa8800680314a5b3aa0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
memcpy
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strstr
sscanf
sprintf
strncpy
??2@YAPAXI@Z
wcslen
strcmp
_wfopen
fseek
ftell
fclose
wcscat
wcsstr
wcscmp
mbstowcs
srand
rand
memset
strlen
isalpha
isdigit
ws2_32
ioctlsocket
select
socket
closesocket
htons
connect
shutdown
send
recv
inet_addr
gethostbyname
wininet
InternetOpenUrlW
InternetOpenW
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
urlmon
URLDownloadToFileW
shlwapi
PathMatchSpecW
StrCmpNW
PathFileExistsW
PathFindFileNameW
kernel32
GetTickCount
WriteFile
DeleteFileW
CreateFileW
GetFileSize
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapAlloc
HeapFree
UnmapViewOfFile
CloseHandle
ExpandEnvironmentStringsW
SetEndOfFile
Sleep
ExitThread
GlobalAlloc
GlobalUnlock
GetModuleHandleA
ExitProcess
IsDebuggerPresent
GetCurrentProcess
CheckRemoteDebuggerPresent
lstrlenA
CopyFileW
lstrcpyW
QueryDosDeviceW
GetDriveTypeW
GetLogicalDrives
RemoveDirectoryW
FindClose
FindNextFileW
MoveFileExW
lstrcmpW
FindFirstFileW
CreateDirectoryW
SetFilePointer
GlobalLock
GetStartupInfoA
CreateMutexA
GetLastError
CreateThread
FlushViewOfFile
CreateProcessW
GetModuleFileNameW
GetVolumeInformationW
SetCurrentDirectoryW
GetFullPathNameW
SetFileAttributesW
lstrcmpiW
user32
wsprintfA
CharLowerW
wsprintfW
GetClipboardData
OpenClipboard
EmptyClipboard
CloseClipboard
SetClipboardData
advapi32
CryptAcquireContextW
CryptEncrypt
CryptImportKey
CryptVerifySignatureA
CryptHashData
CryptCreateHash
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExA
RegSetValueExW
CryptDestroyKey
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ