File name:

svchost.exe

Full analysis: https://app.any.run/tasks/904171d6-3274-4698-849c-eba0f95b8af4
Verdict: Malicious activity
Threats:

Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.

Analysis date: November 05, 2024, 15:22:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phorpiex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

2968307563096DFE9C628171A724744F

SHA1:

FBD80E98D6BFE740FB5FF09F46C6B248815FB4FE

SHA256:

003F5FC1E43950BB9DB92C2E8FB72425C1177B6E98FDE8B41F9A94E4D3549AF5

SSDEEP:

768:pfYTQcosQYdbRj+WtZ/u36hewjLvTW6eFugPQmxDocx:pf1cwYVo36kaReFugPrxDt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHORPIEX has been detected (SURICATA)

      • svchost.exe (PID: 6832)
    • Connects to the CnC server

      • svchost.exe (PID: 6832)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • svchost.exe (PID: 6832)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:07 22:16:24+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 15872
InitializedDataSize: 59904
UninitializedDataSize: -
EntryPoint: 0x4af6
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PHORPIEX svchost.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6832"C:\Users\admin\AppData\Local\Temp\svchost.exe" C:\Users\admin\AppData\Local\Temp\svchost.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
596
Read events
593
Write events
3
Delete events
0

Modification events

(PID) Process:(6832) svchost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6832) svchost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6832) svchost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
97
TCP/UDP connections
122
DNS requests
51
Threats
107

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6832
svchost.exe
GET
404
64.70.78.32:80
http://worm.ws/2
unknown
malicious
4700
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6832
svchost.exe
GET
404
64.70.78.32:80
http://worm.ws/1
unknown
malicious
5488
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6832
svchost.exe
GET
404
64.70.78.32:80
http://worm.ws/3
unknown
malicious
6832
svchost.exe
GET
404
64.70.78.32:80
http://worm.ws/4
unknown
malicious
6832
svchost.exe
GET
404
64.70.78.32:80
http://worm.ws/5
unknown
malicious
6832
svchost.exe
GET
64.70.19.203:80
http://seuufhehfueugheu.ws/1
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.17:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4360
SearchApp.exe
2.23.209.150:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
816
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.17
  • 2.16.164.81
  • 2.16.164.129
  • 2.16.164.128
  • 2.16.164.67
  • 2.16.164.89
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
www.bing.com
  • 2.23.209.150
  • 2.23.209.137
  • 2.23.209.143
  • 2.23.209.149
  • 2.23.209.142
  • 2.23.209.135
  • 2.23.209.140
  • 2.23.209.156
  • 2.23.209.144
  • 2.16.110.152
  • 2.16.110.176
  • 2.16.110.195
  • 2.16.110.170
  • 2.16.110.121
  • 2.16.110.193
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.186.46
whitelisted
api.wipmania.com
  • 127.0.0.1
unknown
login.live.com
  • 20.190.159.75
  • 20.190.159.23
  • 40.126.31.67
  • 40.126.31.73
  • 20.190.159.64
  • 20.190.159.4
  • 20.190.159.2
  • 40.126.31.69
whitelisted
th.bing.com
  • 2.16.110.193
  • 2.16.110.152
  • 2.16.110.176
  • 2.16.110.195
  • 2.16.110.170
  • 2.16.110.121
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2172
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
90 ETPRO signatures available at the full report
No debug info