Behavioral task
behavioral1
Sample
d4bbc125a9e94de44f4deea9d6b10adc87a1ec1aedd753b39d26bb15817fdadb.exe
Resource
win7-20240729-en
General
-
Target
d4bbc125a9e94de44f4deea9d6b10adc87a1ec1aedd753b39d26bb15817fdadb.exe
-
Size
107KB
-
MD5
f437204b3e1627d8b03eefdf360281ad
-
SHA1
c824e787a9786d5fdd19effdec54abef217e5b39
-
SHA256
d4bbc125a9e94de44f4deea9d6b10adc87a1ec1aedd753b39d26bb15817fdadb
-
SHA512
bdb6fc7d1e7f61df6a7ff3036fd56793e1096937fb07fbe033692f20de1bc81ca0215c5eff5a21627607c1ca514296d9598490c244bba5ec60c74653e1978910
-
SSDEEP
1536:HBlri9Fmav82fMJsznUMPcPfNthq4HC1xaQaQG9MFiL3:hp7O3MizVGlt7SZFiL3
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3BiS1jaRpWtkqtfZGp9f1rXXts5DyUkaBX
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
x877d7osne
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule sample family_phorphiex -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4bbc125a9e94de44f4deea9d6b10adc87a1ec1aedd753b39d26bb15817fdadb.exe
Files
-
d4bbc125a9e94de44f4deea9d6b10adc87a1ec1aedd753b39d26bb15817fdadb.exe.exe windows:5 windows x86 arch:x86
1884e74db115b05c8c8ede49a5307238
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
recvfrom
setsockopt
bind
sendto
ioctlsocket
WSAStartup
shutdown
htons
socket
connect
WSAWaitForMultipleEvents
listen
WSASocketA
WSACreateEvent
WSAGetOverlappedResult
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSASend
WSARecv
WSACloseEvent
accept
getpeername
getsockname
inet_addr
gethostbyname
inet_ntoa
closesocket
recv
send
shlwapi
StrStrIA
StrCmpNW
StrStrW
PathFileExistsW
StrChrA
PathFindFileNameW
StrCmpNIA
PathMatchSpecW
urlmon
URLDownloadToFileW
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
DeleteUrlCacheEntry
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCrackUrlA
HttpAddRequestHeadersA
HttpQueryInfoA
InternetOpenUrlA
ntdll
strlen
iswdigit
iswalpha
memcpy
memset
NtQueryVirtualMemory
RtlUnwind
_chkstk
_aulldiv
wcslen
wcscmp
_allshl
_aullshr
strstr
strcmp
memmove
memcmp
RtlTimeToSecondsSince1980
NtQuerySystemTime
mbstowcs
msvcrt
_vscprintf
srand
rand
kernel32
GetQueuedCompletionStatus
PostQueuedCompletionStatus
GetSystemInfo
FindClose
SetEvent
CreateProcessW
GetLocaleInfoA
DeleteCriticalSection
GetCurrentThread
GetThreadPriority
SetThreadPriority
GetCurrentProcess
DuplicateHandle
IsBadReadPtr
InterlockedExchangeAdd
InterlockedIncrement
WaitForSingleObject
InterlockedDecrement
InterlockedExchange
HeapFree
HeapValidate
HeapReAlloc
GetProcessHeaps
HeapCreate
HeapSetInformation
GetCurrentProcessId
HeapAlloc
CreateMutexA
GetLastError
ExitProcess
CreateEventA
CreateThread
GetModuleFileNameW
GetVolumeInformationW
GetDiskFreeSpaceExW
SetFileAttributesW
CopyFileW
lstrcmpiW
CreateDirectoryW
FindFirstFileW
lstrcmpW
MoveFileExW
FindNextFileW
CreateIoCompletionPort
RemoveDirectoryW
ExpandEnvironmentStringsW
DeleteFileW
GetLogicalDrives
GetDriveTypeW
QueryDosDeviceW
lstrcpyW
WriteFile
FlushFileBuffers
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateFileW
CreateFileMappingW
MapViewOfFile
GetFileSize
UnmapViewOfFile
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenA
lstrlenW
lstrcpynW
MultiByteToWideChar
ExitThread
GetTickCount
Sleep
GetModuleHandleW
CloseHandle
user32
RegisterClassExW
CreateWindowExW
GetMessageA
TranslateMessage
wsprintfW
DefWindowProcA
ChangeClipboardChain
RegisterRawInputDevices
GetClipboardData
DispatchMessageA
OpenClipboard
EmptyClipboard
SetClipboardData
IsClipboardFormatAvailable
SendMessageA
SetWindowLongW
SetClipboardViewer
GetWindowLongW
wsprintfA
wvsprintfA
CloseClipboard
advapi32
CryptAcquireContextW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
CryptReleaseContext
RegCloseKey
CryptGenRandom
shell32
ShellExecuteW
ole32
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE