File name:

9a50980afb1c6a43cf38872e694bb7db.exe

Full analysis: https://app.any.run/tasks/5bb5fac8-6a2f-4f87-8134-f9ca4fd3ebd2
Verdict: Malicious activity
Threats:

Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.

Analysis date: April 09, 2021, 10:00:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
phorpiex
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9A50980AFB1C6A43CF38872E694BB7DB

SHA1:

237AA3EE8C912E6F8326782B790327562CEF8DD9

SHA256:

78BB6FE6BDE75A9BA11D0D2F69306619290F90AA94448D6AA4DA340D2144E1CB

SSDEEP:

768:U/SNkb70fCuCMbKGfqDdBJ/useFQcPiPiPiPdhohohohohohohohohohohohohd:ZkbgfCuCwNfqFeFLPiPiPiPdhohohohc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
      • 3356928903.exe (PID: 2856)
      • 3646815081.exe (PID: 3232)
    • Application was dropped or rewritten from another process

      • 3356928903.exe (PID: 2856)
      • 3531133779.exe (PID: 2340)
      • smss.exe (PID: 2384)
      • 3646815081.exe (PID: 3232)
      • sedsvc.exe (PID: 3216)
    • PHORPIEX was detected

      • svchost.exe (PID: 3088)
      • smss.exe (PID: 2384)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
      • 3356928903.exe (PID: 2856)
      • svchost.exe (PID: 3088)
      • smss.exe (PID: 2384)
      • 3646815081.exe (PID: 3232)
    • Drops a file that was compiled in debug mode

      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
      • svchost.exe (PID: 3088)
      • 3356928903.exe (PID: 2856)
      • smss.exe (PID: 2384)
      • 3646815081.exe (PID: 3232)
    • Creates executable files which already exist in Windows

      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
    • Starts itself from another location

      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
      • 3356928903.exe (PID: 2856)
      • 3646815081.exe (PID: 3232)
    • Drops a file with a compile date too recent

      • svchost.exe (PID: 3088)
      • 3356928903.exe (PID: 2856)
      • smss.exe (PID: 2384)
      • 3646815081.exe (PID: 3232)
    • Checks for external IP

      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
      • 3356928903.exe (PID: 2856)
      • 3531133779.exe (PID: 2340)
      • svchost.exe (PID: 3088)
      • smss.exe (PID: 2384)
      • 3646815081.exe (PID: 3232)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • svchost.exe (PID: 3088)
      • 9a50980afb1c6a43cf38872e694bb7db.exe (PID: 1524)
      • 3356928903.exe (PID: 2856)
      • smss.exe (PID: 2384)
      • 3646815081.exe (PID: 3232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: -
OSVersion: 5
EntryPoint: 0x579a
UninitializedDataSize: -
InitializedDataSize: 18432
CodeSize: 18944
LinkerVersion: 9
PEType: PE32
TimeStamp: 2021:02:04 05:46:14+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 04-Feb-2021 04:46:14
Detected languages:
  • English - United States
Debug artifacts:

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 04-Feb-2021 04:46:14
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00004932
0x00004A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.71918
.rdata
0x00006000
0x000020F0
0x00002200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.62953
.data
0x00009000
0x000019D4
0x00001800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.11269
.rsrc
0x0000B000
0x000001B4
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.09798
.reloc
0x0000C000
0x00000AE6
0x00000C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.18457

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.79597
346
Latin 1 / Western European
English - United States
RT_MANIFEST

Imports

ADVAPI32.dll
KERNEL32.dll
MSVCRT.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
WININET.dll
ole32.dll
urlmon.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start 9a50980afb1c6a43cf38872e694bb7db.exe #PHORPIEX svchost.exe 3356928903.exe 3531133779.exe #PHORPIEX smss.exe 3646815081.exe sedsvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1524"C:\Users\admin\AppData\Local\Temp\9a50980afb1c6a43cf38872e694bb7db.exe" C:\Users\admin\AppData\Local\Temp\9a50980afb1c6a43cf38872e694bb7db.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\9a50980afb1c6a43cf38872e694bb7db.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2340C:\Users\admin\AppData\Local\Temp\3531133779.exeC:\Users\admin\AppData\Local\Temp\3531133779.exe
svchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\3531133779.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2384C:\32322353216190\smss.exeC:\32322353216190\smss.exe
3356928903.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\32322353216190\smss.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2856C:\Users\admin\AppData\Local\Temp\3356928903.exeC:\Users\admin\AppData\Local\Temp\3356928903.exe
svchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\3356928903.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3088C:\317911627874\svchost.exeC:\317911627874\svchost.exe
9a50980afb1c6a43cf38872e694bb7db.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\317911627874\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3216C:\2173683336006\sedsvc.exeC:\2173683336006\sedsvc.exe3646815081.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\2173683336006\sedsvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3232C:\Users\admin\AppData\Local\Temp\3646815081.exeC:\Users\admin\AppData\Local\Temp\3646815081.exe
smss.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\3646815081.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
151
Read events
94
Write events
57
Delete events
0

Modification events

(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1524) 9a50980afb1c6a43cf38872e694bb7db.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Host Process for Windows Services
Value:
C:\317911627874\svchost.exe
(PID) Process:(3088) svchost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3088) svchost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
6
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
15249a50980afb1c6a43cf38872e694bb7db.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\3FQOR1YM.htm
MD5:
SHA256:
3088svchost.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\GQE43VRB.htm
MD5:
SHA256:
28563356928903.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\H7YCI2KD.htm
MD5:
SHA256:
23403531133779.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\4SBH7JTO.htm
MD5:
SHA256:
2384smss.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\RUBAM6TC.htm
MD5:
SHA256:
32323646815081.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\A9IZB0VY.htm
MD5:
SHA256:
3088svchost.exeC:\Users\admin\AppData\Local\Temp\3531133779.exebinary
MD5:
SHA256:
3088svchost.exeC:\Users\admin\AppData\Local\Temp\3356928903.exebinary
MD5:
SHA256:
3088svchost.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\2[1]binary
MD5:
SHA256:
2384smss.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\11aa[1]binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
52
TCP/UDP connections
36
DNS requests
9
Threats
46

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3088
svchost.exe
GET
185.215.113.8:80
http://185.215.113.8/3
PT
malicious
3088
svchost.exe
GET
185.215.113.8:80
http://185.215.113.8/1
PT
malicious
3088
svchost.exe
GET
185.215.113.8:80
http://185.215.113.8/2
PT
malicious
3088
svchost.exe
GET
185.215.113.8:80
http://185.215.113.8/6
PT
malicious
3088
svchost.exe
GET
185.215.113.8:80
http://185.215.113.8/4
PT
malicious
3088
svchost.exe
GET
185.215.113.93:80
http://tsrv3.ru/1
PT
malicious
3088
svchost.exe
GET
185.215.113.93:80
http://tsrv3.ru/2
PT
malicious
3088
svchost.exe
GET
185.215.113.93:80
http://tsrv4.ws/2
PT
malicious
3088
svchost.exe
GET
185.215.113.93:80
http://tsrv4.ws/1
PT
malicious
1524
9a50980afb1c6a43cf38872e694bb7db.exe
GET
200
212.83.168.196:80
http://api.wipmania.com/
FR
text
20 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1524
9a50980afb1c6a43cf38872e694bb7db.exe
212.83.168.196:80
api.wipmania.com
Online S.a.s.
FR
malicious
3088
svchost.exe
212.83.168.196:80
api.wipmania.com
Online S.a.s.
FR
malicious
3088
svchost.exe
185.215.113.8:80
Ebonyhorizon Telecomunicacoes S.A.
PT
malicious
192.168.100.166:137
malicious
3088
svchost.exe
185.215.113.93:80
tsrv3.ru
Ebonyhorizon Telecomunicacoes S.A.
PT
malicious
2856
3356928903.exe
212.83.168.196:80
api.wipmania.com
Online S.a.s.
FR
malicious
2384
smss.exe
185.215.113.93:80
tsrv3.ru
Ebonyhorizon Telecomunicacoes S.A.
PT
malicious
3232
3646815081.exe
212.83.168.196:80
api.wipmania.com
Online S.a.s.
FR
malicious
3088
svchost.exe
23.217.138.108:80
tsrv5.top
Akamai Technologies, Inc.
US
whitelisted
2384
smss.exe
212.83.168.196:80
api.wipmania.com
Online S.a.s.
FR
malicious

DNS requests

Domain
IP
Reputation
api.wipmania.com
  • 212.83.168.196
unknown
tsrv3.ru
  • 185.215.113.93
malicious
tsrv4.ws
  • 185.215.113.93
malicious
tsrv5.top
  • 23.217.138.108
  • 23.202.231.167
malicious
tldrbox.top
malicious
tldrhaus.top
  • 185.215.113.93
malicious
tldrzone.top
  • 185.215.113.93
malicious
worm.ws
  • 185.215.113.93
malicious

Threats

PID
Process
Class
Message
1524
9a50980afb1c6a43cf38872e694bb7db.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Attempt To Wipmania
3088
svchost.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Attempt To Wipmania
3088
svchost.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 24
3088
svchost.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 24
3088
svchost.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Phorpiex.V
2856
3356928903.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Attempt To Wipmania
3088
svchost.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Phorpiex.V
1056
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2340
3531133779.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Attempt To Wipmania
3088
svchost.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
20 ETPRO signatures available at the full report
No debug info