Behavioral task
behavioral1
Sample
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b.exe
Resource
win10v2004-20240412-en
General
-
Target
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b
-
Size
100KB
-
MD5
1fe26231c66ad0b21e804a897e07f6ee
-
SHA1
7e5cc26fbf11c4e65291617722145be1e6872aed
-
SHA256
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b
-
SHA512
35aa41be52995c97c25fe29efe6d9cad526368910bfbe99cf73a94917e7f65a2982f041f126a7f4433ab04770cd7bf8d45924d77aa99ac36e43adae30a9056a0
-
SSDEEP
3072:UlmICQuNwVOv/8I6WruEPJZDUXA2M1CUci6sUJW51TrFS83FoO:WmICRmgMtWruEhZDCA2M1CUci6sUJW5n
Malware Config
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule sample family_phorphiex -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b
Files
-
00475e1ce0883ac76f08f6f2387496c8298902a34fa0631f3f45f38c48e3713b.exe windows:5 windows x86 arch:x86
23ab644c44593e426ea915e5618d637d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
memmove
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcscmp
srand
rand
mbstowcs
strchr
strcmp
_wfopen
fseek
ftell
fclose
memset
_mbsstr
strlen
isalpha
isdigit
wcsstr
wcslen
iswalpha
iswdigit
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strtol
memchr
memcmp
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
InternetOpenUrlW
InternetOpenW
InternetReadFile
urlmon
URLDownloadToFileW
shlwapi
PathMatchSpecW
StrCmpNW
PathFileExistsW
PathFindFileNameW
PathFileExistsA
ws2_32
setsockopt
send
getaddrinfo
recv
socket
connect
closesocket
listen
bind
htonl
htons
inet_pton
ntohl
shutdown
WSACleanup
WSAStartup
getsockname
ntohs
WSAAccept
WSARecv
WSASend
WSAGetLastError
freeaddrinfo
inet_ntop
kernel32
GlobalAlloc
GlobalLock
GlobalUnlock
WaitForMultipleObjects
GetQueuedCompletionStatus
PostQueuedCompletionStatus
LoadLibraryA
GetProcAddress
lstrlenW
TerminateThread
CloseHandle
CreateIoCompletionPort
SleepEx
SetLastError
GlobalFree
GetSystemTimeAsFileTime
GetTickCount
lstrcpynA
ExitThread
SetEndOfFile
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
CreateProcessW
GetLocaleInfoA
DeleteFileW
WriteFile
ExpandEnvironmentStringsW
lstrcpyW
QueryDosDeviceW
GetDriveTypeW
GetLogicalDrives
RemoveDirectoryW
FindClose
FindNextFileW
MoveFileExW
lstrcmpW
WaitForSingleObject
GetLastError
GetStartupInfoA
GetModuleHandleA
MoveFileW
MoveFileA
DeleteFileA
ExitProcess
CreateMutexA
CopyFileA
CreateThread
GetTempPathW
GetModuleFileNameW
GetVolumeInformationW
SetFileAttributesW
CopyFileW
lstrcmpiW
CreateDirectoryW
lstrlenA
Sleep
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FindFirstFileW
user32
FindWindowA
ShowWindow
SetForegroundWindow
CloseWindow
SetFocus
wsprintfA
wsprintfW
GetClipboardData
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
advapi32
CryptReleaseContext
CryptGenRandom
CryptEncrypt
CryptDestroyKey
CryptGetKeyParam
CryptImportKey
CryptSetKeyParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptDuplicateHash
CryptExportKey
CryptVerifySignatureA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegSetValueExW
CryptAcquireContextW
CryptAcquireContextA
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ