gizfzg zdztufutzdrtf z zdd tzt
Behavioral task
behavioral1
Sample
980f4f8d01c746653b3a9b7fc41be0a66d88ac7c8d7f729eb8e123f3604f38c1.exe
Resource
win7-20240903-en
General
-
Target
ABC6E87B5F26BADF.zip
-
Size
14KB
-
MD5
6a0bc4c826b94696519cbbb1a272932c
-
SHA1
f6586e6cd250fa0847b9d886110b230f5edf3523
-
SHA256
e0fa830fae317de959f388ef4c8ae19c38bb7ddbd9ab95ed76d56a1838e8b5c2
-
SHA512
056052bd6df060129f32905ddbe2855390bda31a198b36eb99137347eb6b8fbb6cc9a48bb0ee478f19287cc19d7971c1381ba851622763ab0e2e86cf4d45ca83
-
SSDEEP
384:cf8937sWkygPO0/TJgTroyqHGr8dQWnEhwYgv:cf8JYGEgHot2gtEhwYgv
Malware Config
Extracted
phorphiex
http://b0t.to/
http://gshrghirhgsgrao.to/
http://hehfaofiehgggao.to/
http://soghrrsoeuhugao.to/
http://eiiiaoihoaeruao.to/
http://roiriorisioroao.to/
http://ouhgousgoahutao.to/
http://oeoaoueuoeuoaao.to/
http://aiaizzzezeezeao.to/
http://ouauooaoaoeeuao.to/
http://oeeoeuueueuueao.to/
http://eobbeaubfeuueao.to/
http://aauaaaeieiieeao.to/
http://aaaeieiiiofffao.to/
http://infineinfinigao.to/
http://baoefubfbfigoao.to/
http://aaauuwiifoogeao.to/
http://plporsiszsgetao.to/
http://gshrghirhgsgrla.co/
http://hehfaofiehgggla.co/
http://soghrrsoeuhugla.co/
http://eiiiaoihoaerula.co/
http://roiriorisiorola.co/
http://ouhgousgoahutla.co/
http://oeoaoueuoeuoala.co/
http://aiaizzzezeezela.co/
http://ouauooaoaoeeula.co/
http://oeeoeuueueuuela.c
1L6sJ7pmk6EGMUoTmpdbLez9dXACcirRHh
qzgdgnfd805z83wpu04rhld0yqs4dlrd35ll0ltqql
Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i
D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M
0xa5228127395263575a4b4f532e4f132b14599d24
LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7
t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule static1/unpack001/980f4f8d01c746653b3a9b7fc41be0a66d88ac7c8d7f729eb8e123f3604f38c1 family_phorphiex -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/980f4f8d01c746653b3a9b7fc41be0a66d88ac7c8d7f729eb8e123f3604f38c1
Files
-
ABC6E87B5F26BADF.zip.zip
Password: infected
-
980f4f8d01c746653b3a9b7fc41be0a66d88ac7c8d7f729eb8e123f3604f38c1.exe windows:5 windows x86 arch:x86
Password: infected
f6eb365b415d52c68fde9779f25c6573
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcscat
memset
wcsstr
wcscmp
wcslen
wcstombs
mbstowcs
srand
rand
_snwprintf
strlen
isalpha
isdigit
memcpy
wininet
InternetOpenUrlW
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetOpenW
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileW
shlwapi
StrCmpNW
PathFindFileNameW
PathMatchSpecW
PathFileExistsW
kernel32
GetVolumeInformationW
SetFileAttributesW
CopyFileW
lstrcmpiW
SetCurrentDirectoryW
GetFullPathNameW
GetModuleFileNameW
FindFirstFileW
lstrcmpW
MoveFileExW
FindNextFileW
FindClose
RemoveDirectoryW
GetLogicalDrives
CreateProcessW
GetLastError
GetCurrentProcess
TerminateProcess
OpenProcess
lstrcmpA
Process32Next
Process32First
CreateToolhelp32Snapshot
FlushViewOfFile
CreateThread
CreateMutexA
GetStartupInfoA
CreateDirectoryW
IsDebuggerPresent
ExitProcess
GetModuleHandleA
GlobalUnlock
GlobalLock
GlobalAlloc
ExitThread
Sleep
SetEndOfFile
SetFilePointer
CloseHandle
UnmapViewOfFile
HeapFree
HeapAlloc
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
DeleteFileW
GetDriveTypeW
GetTickCount
ExpandEnvironmentStringsW
lstrcpyW
QueryDosDeviceW
WriteFile
user32
wsprintfA
CloseClipboard
CharUpperA
CharLowerW
wsprintfW
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
advapi32
CryptAcquireContextW
CryptEncrypt
CryptImportKey
CryptVerifySignatureA
CryptHashData
CryptCreateHash
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegSetValueExW
CryptDestroyKey
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ