Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
ev.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ev.exe
Resource
win10v2004-20241007-en
General
-
Target
ev.exe
-
Size
16KB
-
MD5
56c16aff11b467b005d11b493defbe4c
-
SHA1
ab7b8c80eeee91de84c1c3c3886fb18a826f1bad
-
SHA256
622bda80fb2ea6f132ff3efe37bae181b4acd0f182ae116682dcb9e6348cc26a
-
SHA512
5075f7e197b7726514e85124644442a2010d2566338fdc4b787ed74f933b83490cadcc42776282b19808f14c402ca0bdc4c3d172385b4abf418bb38dda9b3ec9
-
SSDEEP
192:FlSkyHv47AylNTkBr8NeFBzTvtm2F/SzbFJxTjmFpBnE:b/6vVylNXMjtm2FWF3u
Malware Config
Extracted
phorphiex
http://91.202.233.141
Signatures
-
Phorphiex family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ev.exe
Files
-
ev.exe.exe windows:5 windows x86 arch:x86
28f8ee6bc45a15bf2086c83c8b89e2e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_onexit
_decode_pointer
_lock
_invoke_watson
_controlfp_s
_crt_debugger_hook
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_except_handler4_common
wcscat
wininet
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
shlwapi
PathFileExistsW
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
InterlockedExchange
Sleep
ExpandEnvironmentStringsW
CreateFileW
CloseHandle
GetSystemTimeAsFileTime
TerminateProcess
InterlockedCompareExchange
UnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
user32
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegSetValueExW
shell32
ShellExecuteA
ShellExecuteW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ