Overview
overview
7Static
static
5Portable_�...n3.exe
windows7-x64
5Portable_�...n3.exe
windows10-2004-x64
5Portable_�...on.dll
windows7-x64
3Portable_�...on.dll
windows10-2004-x64
3Portable_�...le.exe
windows7-x64
7Portable_�...le.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 11:16
Behavioral task
behavioral1
Sample
Portable_去廣告_C.Psiphon3.184 20241119/App/Psiphon/psiphon3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Portable_去廣告_C.Psiphon3.184 20241119/App/Psiphon/psiphon3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Portable_去廣告_C.Psiphon3.184 20241119/App/Psiphon/version.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Portable_去廣告_C.Psiphon3.184 20241119/App/Psiphon/version.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Portable_去廣告_C.Psiphon3.184 20241119/PsiphonPortable.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Portable_去廣告_C.Psiphon3.184 20241119/PsiphonPortable.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/MoreInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/MoreInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/execDos.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/execDos.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/newtextreplace.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/newtextreplace.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20241007-en
General
-
Target
Portable_去廣告_C.Psiphon3.184 20241119/PsiphonPortable.exe
-
Size
142KB
-
MD5
49bf9dca0c8eaff957f62f0f3cef0ba5
-
SHA1
c15ad261cf8e2e33fe36c9b69abfdc29bac3d19d
-
SHA256
cc7c4aca06452689cd8be37ab8ba2285f6b977ffa7473812713190bf3f2996d4
-
SHA512
ce352f7c82aee9a464d4f452ecafebeaeb7db87bfe5f8818a7e2354fe66208dbdf69c2fbdef197d41fbfeacdb7238b1447c188f24ad6ab03d86f3882ca4b2d64
-
SSDEEP
3072:YqeqOYEUXPnDSwPK4u1I0KzpFKFpcVDxCtODy:jEUXP7u1WpF/Dy
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe -
resource yara_rule behavioral6/memory/4168-90-0x0000000000400000-0x0000000001F8D000-memory.dmp upx behavioral6/memory/4168-94-0x0000000000400000-0x0000000001F8D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3364 4168 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PsiphonPortable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language psiphon3.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon psiphon3.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon\ = "URL:psiphon" psiphon3.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon\URL Protocol psiphon3.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon\shell\open\command psiphon3.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon\shell psiphon3.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon\shell\open psiphon3.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\psiphon\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Portable_去廣告_C.Psiphon3.184 20241119\\App\\Psiphon\\psiphon3.exe\" -- \"%1\"" psiphon3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe 2240 PsiphonPortable.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4168 psiphon3.exe 4168 psiphon3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4168 2240 PsiphonPortable.exe 83 PID 2240 wrote to memory of 4168 2240 PsiphonPortable.exe 83 PID 2240 wrote to memory of 4168 2240 PsiphonPortable.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Portable_去廣告_C.Psiphon3.184 20241119\PsiphonPortable.exe"C:\Users\Admin\AppData\Local\Temp\Portable_去廣告_C.Psiphon3.184 20241119\PsiphonPortable.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Portable_去廣告_C.Psiphon3.184 20241119\App\Psiphon\psiphon3.exe"C:\Users\Admin\AppData\Local\Temp\Portable_去廣告_C.Psiphon3.184 20241119\App\Psiphon\psiphon3.exe"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 16803⤵
- Program crash
PID:3364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4168 -ip 41681⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Portable_去廣告_C.Psiphon3.184 20241119\Data\PortableApps.comLauncherRuntimeData-PsiphonPortable.ini
Filesize86B
MD5ae59b96901e0cdec21c84e9b825beae4
SHA14fa7f8482caa7be2169f57445dcabad589ada14a
SHA25629e1ebefc6ca9dbd57d95fdc8c4e50da97ef4667047968a4665605ec20e16a83
SHA512a6ab7abadb1d360a00d0105e30225b5d982cb47dee928d9e45c7aa54f2ff49c7a277651c89c3c49973da49fb9fb86ef92fd2c45fcb16f2f45cf6a407675718ac
-
Filesize
452B
MD5e2a203ca6e155d6960f4d7e7e741893b
SHA1a8737102c5a5aabd5b59a29907fbbbc05df3a9bd
SHA256863df7402e7283f531331f0f97381b81700f745e6b312a1977ef5ae2170ff8e9
SHA512d6c37c12f1f463e0602d603423a0a3ac6c8f088305b020f97f938f33265adbf24cead308639f69da82ed3083a26c51a9601e9604d3b21cadfce145a38bce9d03
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
13KB
MD5a88baad3461d2e9928a15753b1d93fd7
SHA1bb826e35264968bbc3b981d8430ac55df1e6d4a6
SHA256c5ab2926c268257122d0342739e73573d7eeda34c861bc7a68a02cbc69bd41af
SHA5125edcf46680716930da7fd1a41b8b0426f057cf4becefb3ee84798ec8b449726afb822fb626c4942036a1ae3bb937184d1f71d0e45075abb5bf167f5d833df43a
-
Filesize
666B
MD513a80331ae779addf158da5d51515b3f
SHA15cce658366cc5cd8fac1f5287d3e15b1ae5c5cf8
SHA256d463e2ce20e25b2ed290dcf6dc1c01dcc60b5dda71e932ccfa9f5ddf53e81910
SHA51259849a3e60a4075c1a743c67109916213112a1bc494dc47b4e85e621bca8ca4554a155a24f07104846227100c06c7c16bf157e7fc97eb5f00f8121c1b341e2c9
-
Filesize
8KB
MD555a723e125afbc9b3a41d46f41749068
SHA101618b26fec6b8c6bdb866e6e4d0f7a0529fe97c
SHA2560a70cc4b93d87ecd93e538cfbed7c9a4b8b5c6f1042c6069757bda0d1279ed06
SHA512559157fa1b3eb6ae1f9c0f2c71ccc692a0a0affb1d6498a8b8db1436d236fd91891897ac620ed5a588beba2efa43ef064211a7fcadb5c3a3c5e2be1d23ef9d4c
-
Filesize
11KB
MD5b5358341df2cb171876a5f201e31a834
SHA1df34750ea5504274be5ff8ddd306b49e302d04f9
SHA256156b9b583399faf13c4d46b89339fb0f7f38dc847ac2d7872178d8e3998b9734
SHA512821dc42e24fa2d44a1d4d16b26c3da2688dac0fa44a266e38da2aff706c91440d83a87abc74131930e6c38a44a0c5e627db2d045375fde147e0edd3276f4b014
-
Filesize
29KB
MD52880bf3bbbc8dcaeb4367df8a30f01a8
SHA1cb5c65eae4ae923514a67c95ada2d33b0c3f2118
SHA256acb79c55b3b9c460d032a6f3aaf6c642bf8c1d450e23279d091cc0c6ca510973
SHA512ca978702ce7aa04f8d9781a819a57974f9627e969138e23e81e0792ff8356037c300bb27a37a9b5c756220a7788a583c8e40cc23125bcbe48849561b159c4fa3