File name:

sysfgdrvs.exe

Full analysis: https://app.any.run/tasks/549bde22-033b-49a0-9ae3-c99841d14d9d
Verdict: Malicious activity
Threats:

Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.

Analysis date: October 21, 2024, 11:15:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phorpiex
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5DB9A00364B3C87E0BC4C52D3FBDA13D

SHA1:

F2E1F784019DB62DD2866295499650A2A7D629DD

SHA256:

39C853575CBE6AA8343E8616CFC22C2DFDAD567F78B5AEE8E65F38423EBE10E3

SSDEEP:

3072:ujKXgtOA6UplhQpgJvj846xbjq4KcX4wy7WJMzWfV7Ay93UjzkESH1SULRbkUuLa:PyRFFzr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes Security Center notification settings

      • sysfgdrvs.exe (PID: 5196)
    • Connects to the CnC server

      • sysfgdrvs.exe (PID: 5196)
    • PHORPIEX has been detected (SURICATA)

      • sysfgdrvs.exe (PID: 5196)
  • SUSPICIOUS

    • Connects to the server without a host name

      • sysfgdrvs.exe (PID: 5196)
    • Connects to unusual port

      • sysfgdrvs.exe (PID: 5196)
  • INFO

    • Checks supported languages

      • sysfgdrvs.exe (PID: 5196)
    • The process uses the downloaded file

      • sysfgdrvs.exe (PID: 5196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:02:10 07:07:55+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 58880
InitializedDataSize: 23040
UninitializedDataSize: -
EntryPoint: 0x5aa0
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PHORPIEX sysfgdrvs.exe

Process information

PID
CMD
Path
Indicators
Parent process
5196"C:\Users\admin\AppData\Local\Temp\sysfgdrvs.exe" C:\Users\admin\AppData\Local\Temp\sysfgdrvs.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\sysfgdrvs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
2 383
Read events
2 373
Write events
10
Delete events
0

Modification events

(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:FirewallOverride
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:FirewallDisableNotify
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:AntiSpywareOverride
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:AntiVirusOverride
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:AntiVirusDisableNotify
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:UpdatesOverride
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:UpdatesDisableNotify
Value:
1
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5196) sysfgdrvs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5196sysfgdrvs.exeC:\Users\admin\tnnodes.datbinary
MD5:B3B2F336DAE539F8F7D6E503F4E963D5
SHA256:7BEA051076CABD04282411E544A0FBD95B4BA37470B0B3ED08168BE3AAF88764
5196sysfgdrvs.exeC:\Users\admin\AppData\Local\Temp\28187822.exebinary
MD5:1FCB78FB6CF9720E9D9494C42142D885
SHA256:84652BB8C63CA4FD7EB7A2D6EF44029801F3057AA2961867245A3A765928DD02
5196sysfgdrvs.exeC:\Users\admin\AppData\Local\Temp\2916410233.exebinary
MD5:FE1E93F12CCA3F7C0C897EF2084E1778
SHA256:2EBC4A92F4FDC27D4AB56E57058575A8B18ADB076CBD30FEEA2ECDC8B7FCD41F
5196sysfgdrvs.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\2[1]binary
MD5:FE1E93F12CCA3F7C0C897EF2084E1778
SHA256:2EBC4A92F4FDC27D4AB56E57058575A8B18ADB076CBD30FEEA2ECDC8B7FCD41F
5196sysfgdrvs.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\1[1]binary
MD5:1FCB78FB6CF9720E9D9494C42142D885
SHA256:84652BB8C63CA4FD7EB7A2D6EF44029801F3057AA2961867245A3A765928DD02
5196sysfgdrvs.exeC:\Users\admin\AppData\Local\Temp\295529796.exebinary
MD5:1FCB78FB6CF9720E9D9494C42142D885
SHA256:84652BB8C63CA4FD7EB7A2D6EF44029801F3057AA2961867245A3A765928DD02
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
68
DNS requests
21
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.113.232:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.32.113.232:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5196
sysfgdrvs.exe
GET
185.215.113.84:80
http://185.215.113.84/twizt/1
unknown
malicious
5232
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5196
sysfgdrvs.exe
GET
200
185.215.113.84:80
http://185.215.113.84/twizt/1
unknown
malicious
5196
sysfgdrvs.exe
GET
185.215.113.84:80
http://185.215.113.84/twizt/2
unknown
malicious
4568
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.32.113.232:80
www.microsoft.com
PT Telekomunikasi Indonesia
ID
whitelisted
5488
MoUsoCoreWorker.exe
23.32.113.232:80
www.microsoft.com
PT Telekomunikasi Indonesia
ID
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
816
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 23.32.113.232
  • 23.36.225.233
whitelisted
google.com
  • 142.250.184.206
whitelisted
www.bing.com
  • 23.38.98.75
  • 23.38.98.83
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.23
whitelisted
th.bing.com
  • 23.38.98.75
  • 23.38.98.83
whitelisted
www.update.microsoft.com
  • 20.109.209.108
whitelisted
go.microsoft.com
  • 23.32.113.166
  • 23.202.185.166
whitelisted

Threats

PID
Process
Class
Message
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
5196
sysfgdrvs.exe
A Network Trojan was detected
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
2 ETPRO signatures available at the full report
No debug info