Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2025 06:29

General

  • Target

    c0b33353c9f851eff81e9b542cbff2ccffe05f5c0da84658aecbd26f3a165ee8.exe

  • Size

    9.2MB

  • MD5

    d93ffee2720341299fd0e9ff4dcf7f08

  • SHA1

    53991521737dd2ce35a90429ced04185198e0f80

  • SHA256

    c0b33353c9f851eff81e9b542cbff2ccffe05f5c0da84658aecbd26f3a165ee8

  • SHA512

    02fa3ba5352821d54a7a2ac5b1bc4fa2f95eae28167204bdb33bdc672edaa5c1ca0bfc610c20f7ea90dd73c5f64e02a9daa9f0bd44ec46da7450550e067e23b7

  • SSDEEP

    98304:0te1xEOX9OcczjREI9tQeek2rT0DIcsn9Vhek2rv0DIRpKWf2gcek2rQ/:VGOXsccpt9crYercrsyfLccrw

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 12 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0b33353c9f851eff81e9b542cbff2ccffe05f5c0da84658aecbd26f3a165ee8.exe
    "C:\Users\Admin\AppData\Local\Temp\c0b33353c9f851eff81e9b542cbff2ccffe05f5c0da84658aecbd26f3a165ee8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\Windows ygjaxs.dll
      "C:\Users\Admin\AppData\Local\Temp\\Windows ygjaxs.dll"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2712
    • C:\Users\Admin\AppData\Local\Temp\COM Surrogate.cmd
      "C:\Users\Admin\AppData\Local\Temp\\COM Surrogate.cmd"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Local\Temp\Server.dll
        C:\Users\Admin\AppData\Local\Temp\\Server.dll
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2736
      • C:\Users\Admin\AppData\Local\Temp\Server.dll
        C:\Users\Admin\AppData\Local\Temp\\Server.dll
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:12536
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\Server.dll > nul
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:7836
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 2 127.0.0.1
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:7752
      • C:\Users\Admin\AppData\Local\Temp\Server.dll
        C:\Users\Admin\AppData\Local\Temp\\Server.dll
        3⤵
        • Executes dropped EXE
        PID:21040
    • C:\Users\Admin\AppData\Roaming\Windows Security Health.cmd
      "C:\Users\Admin\AppData\Roaming\\Windows Security Health.cmd"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\SysWOW64\Serveri.dll
        C:\Windows\system32\\Serveri.dll
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:21028
      • C:\Windows\SysWOW64\Serveri.dll
        C:\Windows\system32\\Serveri.dll
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:6872
      • C:\Windows\SysWOW64\Serveri.dll
        C:\Windows\system32\\Serveri.dll
        3⤵
        • Drops file in Drivers directory
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:13520
    • C:\Windows\SysWOW64\Windows.Gaming.Input.exe
      C:\Windows\system32\\Windows.Gaming.Input.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:12564
      • C:\Users\Admin\AppData\Roaming\Windows.dll
        C:\Users\Admin\AppData\Roaming\\Windows.dll
        3⤵
        • Executes dropped EXE
        PID:11824
      • C:\Users\Admin\AppData\Roaming\Windows.dll
        C:\Users\Admin\AppData\Roaming\\Windows.dll
        3⤵
        • Executes dropped EXE
        PID:18468
      • C:\Users\Admin\AppData\Roaming\Windows.dll
        C:\Users\Admin\AppData\Roaming\\Windows.dll
        3⤵
        • Executes dropped EXE
        PID:24536
  • C:\Windows\SysWOW64\Phxph.exe
    C:\Windows\SysWOW64\Phxph.exe -auto
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:13600
  • C:\Windows\SysWOW64\Phxph.exe
    C:\Windows\SysWOW64\Phxph.exe -auto
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:7820
  • C:\Windows\SysWOW64\Phxph.exe
    C:\Windows\SysWOW64\Phxph.exe -auto
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:12516
  • C:\Windows\SysWOW64\Phxph.exe
    C:\Windows\SysWOW64\Phxph.exe -auto
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:24976
  • C:\Windows\SysWOW64\Phxph.exe
    C:\Windows\SysWOW64\Phxph.exe -auto
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Phxph.exe

    Filesize

    22.1MB

    MD5

    44d1ce29474bad8ada3d778af1dac0f3

    SHA1

    319f966cc44529a564f9d5d19e0fb99e0af2ea19

    SHA256

    d75217eccc9e4b9a2ccfb2819b1fdbf01a074042292bcf3162ec27a01b7ee1cf

    SHA512

    511ac3bfa10928190c7cb035a976c673fb758950ce4accde4a80b81b62ee0585d5d51930571ffa177fb1d63ecd4a770415bc09800cc5cd1ac6cb7efa16b7d025

  • \Users\Admin\AppData\Local\Temp\COM Surrogate.cmd

    Filesize

    2.9MB

    MD5

    e1d44431b799d360d924352fb87c0aae

    SHA1

    87210f7c8f8759a5b23e8567643b2dfef51fc1e7

    SHA256

    f41cea6229006c96d286c284cda8ae342d987edfcbec9e3da2a38dc4233ad9f7

    SHA512

    a1cf0fe054e92770d5b7bb22538cd90ce906e0e3119ce66761da3f3cc55642818f0d7cadafb23fb62215395ce1b475affc4c0389e69f5209b708c8dbfcdd646c

  • \Users\Admin\AppData\Local\Temp\Server.dll

    Filesize

    1.1MB

    MD5

    1144ea1e19cb2a42f7ad2fa04db8e476

    SHA1

    2ef6e0f9c5e57305bff6d30080cf68c1d3e101d9

    SHA256

    20569e9045f5c150eafa51752334b62c78b9dbc308d61dacfcb2098a76c5cf50

    SHA512

    3df308eafc0f014a07fbdeb706b32eb5de7e02a7496e70e5035d9b76db239435a2511964fc027380aad19763755c4e07e52f4e157b691c55c5a03d5b21593556

  • \Users\Admin\AppData\Local\Temp\Windows ygjaxs.dll

    Filesize

    459KB

    MD5

    f6bad3e56004d0ec916b9f93bbb971a1

    SHA1

    75e7d20bc42572a7dc1b9a12dc464576079b90b8

    SHA256

    d0b6965be9cc036a316acb456491562aea12d2bb52af12a475966ee7b41fc000

    SHA512

    07961000646b1e95504528afb0d2812a0ad0f3196999cc91401ebad0ecc520bd41075d85fdcce90d4d52b99d92ac21420b5e4140ccc3553a03969af6bab555a6

  • \Users\Admin\AppData\Roaming\Windows Security Health.cmd

    Filesize

    2.9MB

    MD5

    fe86e62f1f8cc2b9160c316c7e1ccffd

    SHA1

    540ed568fad46b2e4bccd6460e98e7e07a78068f

    SHA256

    bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af

    SHA512

    1cbe0eba13af47bfa1781d766dfaab6a0a185afa8f48694b5aab25c20a557101b69b63977a04c4cef0f9b5fde66deaea888e459f755fdee99c061e63f7eeb48a

  • \Windows\SysWOW64\Windows.Gaming.Input.exe

    Filesize

    2.0MB

    MD5

    7c42c0289a8ef2395efc1e7925b2d16e

    SHA1

    5b75f9495a791d982e269f3fb4dcac2b95f5138c

    SHA256

    24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7

    SHA512

    01e5a6f9a5145e01603c84f772e038b2ee40e45fb4d9b307269b199411fa68127e2443ede7ea30f0c630d2c84090de2c38b75ff8e139a7886e341e82b36750bc

  • memory/1488-33-0x0000000002FB0000-0x00000000030D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1740-5779-0x0000000002CA0000-0x0000000002DC4000-memory.dmp

    Filesize

    1.1MB

  • memory/1740-4-0x0000000002CA0000-0x0000000002DC4000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-7-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-14468-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-894-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-904-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-848-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-862-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-860-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-858-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-856-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-864-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-866-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-868-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-870-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-872-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-874-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-876-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-878-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-880-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-882-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-884-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-886-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-888-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-892-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-850-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-890-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-896-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-898-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-900-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-902-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-847-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-906-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-908-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-852-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-37-0x0000000075450000-0x0000000075497000-memory.dmp

    Filesize

    284KB

  • memory/2736-854-0x0000000002200000-0x0000000002311000-memory.dmp

    Filesize

    1.1MB

  • memory/5012-121864-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/7820-95712-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/11824-87005-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/12516-104434-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/12536-34826-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/12564-71836-0x00000000025C0000-0x00000000026E3000-memory.dmp

    Filesize

    1.1MB

  • memory/12564-57490-0x00000000025C0000-0x00000000026E3000-memory.dmp

    Filesize

    1.1MB

  • memory/12564-71711-0x00000000025C0000-0x00000000026E3000-memory.dmp

    Filesize

    1.1MB

  • memory/12564-87010-0x00000000025C0000-0x00000000026E3000-memory.dmp

    Filesize

    1.1MB

  • memory/12564-87008-0x00000000025C0000-0x00000000026E3000-memory.dmp

    Filesize

    1.1MB

  • memory/12564-87002-0x00000000025C0000-0x00000000026E3000-memory.dmp

    Filesize

    1.1MB

  • memory/13520-57483-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/13600-57484-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/13600-34830-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/18468-87009-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/18468-71779-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/21028-36451-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/21040-57489-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/21040-104457-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/24976-113151-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB