gizfzg zdztufutzdrtf z zdd tzt
Behavioral task
behavioral1
Sample
sysbsju.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sysbsju.exe
Resource
win10v2004-20241007-en
General
-
Target
sysbsju.exe
-
Size
30KB
-
MD5
16c678e90ead5bce8a931cca8d9307d0
-
SHA1
c0c237348772fecac0ca9f84ddbfd3718f37e0a1
-
SHA256
066ea7e779e63f2881e049d1c66b712babcf263168e5a118dbecf6546159f11f
-
SHA512
a9d6adebae9d6f7e17b51dff3eef930096c87e71cfdb6591a99f9a8f1b85e22edd2de652be266895083b885b8cc5f790858c3d07c63c7c82e827d38a549080ca
-
SSDEEP
384:PIkpcwLsYEaysekAM1PsLwApaKZ5IRvKztY2Gci0WhYzJjn2Cb1Bg3cW53Yllyt3:PXAxPuPsLwA9ZuYztzYhY0oBEcWGl
Malware Config
Extracted
phorphiex
http://b0t.to/
http://gshrghirhgsgrao.to/
http://hehfaofiehgggao.to/
http://soghrrsoeuhugao.to/
http://eiiiaoihoaeruao.to/
http://roiriorisioroao.to/
http://ouhgousgoahutao.to/
http://oeoaoueuoeuoaao.to/
http://aiaizzzezeezeao.to/
http://ouauooaoaoeeuao.to/
http://oeeoeuueueuueao.to/
http://eobbeaubfeuueao.to/
http://aauaaaeieiieeao.to/
http://aaaeieiiiofffao.to/
http://infineinfinigao.to/
http://baoefubfbfigoao.to/
http://aaauuwiifoogeao.to/
http://plporsiszsgetao.to/
http://gshrghirhgsgrla.co/
http://hehfaofiehgggla.co/
http://soghrrsoeuhugla.co/
http://eiiiaoihoaerula.co/
http://roiriorisiorola.co/
http://ouhgousgoahutla.co/
http://oeoaoueuoeuoala.co/
http://aiaizzzezeezela.co/
http://ouauooaoaoeeula.co/
http://oeeoeuueueuuela.c
1L6sJ7pmk6EGMUoTmpdbLez9dXACcirRHh
qzgdgnfd805z83wpu04rhld0yqs4dlrd35ll0ltqql
Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i
D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M
0xa5228127395263575a4b4f532e4f132b14599d24
LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7
t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule sample family_phorphiex -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource sysbsju.exe
Files
-
sysbsju.exe.exe windows:5 windows x86 arch:x86
f6eb365b415d52c68fde9779f25c6573
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcscat
memset
wcsstr
wcscmp
wcslen
wcstombs
mbstowcs
srand
rand
_snwprintf
strlen
isalpha
isdigit
memcpy
wininet
InternetOpenUrlW
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetOpenW
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileW
shlwapi
StrCmpNW
PathFindFileNameW
PathMatchSpecW
PathFileExistsW
kernel32
GetVolumeInformationW
SetFileAttributesW
CopyFileW
lstrcmpiW
SetCurrentDirectoryW
GetFullPathNameW
GetModuleFileNameW
FindFirstFileW
lstrcmpW
MoveFileExW
FindNextFileW
FindClose
RemoveDirectoryW
GetLogicalDrives
CreateProcessW
GetLastError
GetCurrentProcess
TerminateProcess
OpenProcess
lstrcmpA
Process32Next
Process32First
CreateToolhelp32Snapshot
FlushViewOfFile
CreateThread
CreateMutexA
GetStartupInfoA
CreateDirectoryW
IsDebuggerPresent
ExitProcess
GetModuleHandleA
GlobalUnlock
GlobalLock
GlobalAlloc
ExitThread
Sleep
SetEndOfFile
SetFilePointer
CloseHandle
UnmapViewOfFile
HeapFree
HeapAlloc
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
DeleteFileW
GetDriveTypeW
GetTickCount
ExpandEnvironmentStringsW
lstrcpyW
QueryDosDeviceW
WriteFile
user32
wsprintfA
CloseClipboard
CharUpperA
CharLowerW
wsprintfW
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
advapi32
CryptAcquireContextW
CryptEncrypt
CryptImportKey
CryptVerifySignatureA
CryptHashData
CryptCreateHash
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegSetValueExW
CryptDestroyKey
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ