analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1.exe

Full analysis: https://app.any.run/tasks/90d95551-04be-4d60-86ed-071b9243ffe7
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: August 13, 2019, 23:16:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
phorpiex
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

F8DCF54AA841455DB600FD9DD5243727

SHA1:

CC8EE6BD6E7001852CEAE25A515FDCB91023A4E5

SHA256:

FA2993F2455971244350178008CC671FB739B53D79B594C80E69047421CE1666

SSDEEP:

6144:BMlvS0cEcZcfiInOJA8YHmlGwdHHQbLRpprgzPd7zqxUcr:BMZHcESFInAAvGlGAApuzwxt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 1.exe (PID: 2956)
      • 38720.exe (PID: 2468)
    • Disables Windows Defender

      • sysmudt.exe (PID: 2584)
      • sysrtvo.exe (PID: 3260)
    • Changes Security Center notification settings

      • sysmudt.exe (PID: 2584)
      • sysrtvo.exe (PID: 3260)
    • Disables Windows System Restore

      • sysmudt.exe (PID: 2584)
      • sysrtvo.exe (PID: 3260)
    • Application was dropped or rewritten from another process

      • 38720.exe (PID: 2468)
      • sysrtvo.exe (PID: 3260)
      • 10506.exe (PID: 2148)
      • 39495.exe (PID: 3320)
      • 29433.exe (PID: 724)
    • Connects to CnC server

      • sysmudt.exe (PID: 2584)
    • PHORPIEX was detected

      • sysmudt.exe (PID: 2584)
      • sysrtvo.exe (PID: 3260)
  • SUSPICIOUS

    • Starts itself from another location

      • 1.exe (PID: 2956)
      • 38720.exe (PID: 2468)
      • sysrtvo.exe (PID: 3260)
    • Executable content was dropped or overwritten

      • 1.exe (PID: 2956)
      • sysmudt.exe (PID: 2584)
      • 38720.exe (PID: 2468)
      • sysrtvo.exe (PID: 3260)
      • 29433.exe (PID: 724)
    • Creates files in the user directory

      • sysmudt.exe (PID: 2584)
      • 29433.exe (PID: 724)
    • Connects to SMTP port

      • 10506.exe (PID: 2148)
    • Creates files in the program directory

      • 29433.exe (PID: 724)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

Comments: Under the GNU General Public License
ProductVersion: 5
ProductName: Dev-C++
OriginalFileName: devcpp.exe
LegalTrademarks: -
LegalCopyright: Copyright Bloodshed Software
InternalName: devcpp.exe
FileVersion: 4.9.9.2
FileDescription: Dev-C++ IDE
CompanyName: Bloodshed Software
CharacterSet: Windows, Latin1
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 4.9.9.2
FileVersionNumber: 4.9.9.2
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0xa3e9
UninitializedDataSize: -
InitializedDataSize: 143360
CodeSize: 159744
LinkerVersion: 6
PEType: PE32
TimeStamp: 2016:06:29 16:48:37+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 29-Jun-2016 14:48:37
Detected languages:
  • English - United States
  • Hebrew - Israel
CompanyName: Bloodshed Software
FileDescription: Dev-C++ IDE
FileVersion: 4.9.9.2
InternalName: devcpp.exe
LegalCopyright: Copyright Bloodshed Software
LegalTrademarks: -
OriginalFilename: devcpp.exe
ProductName: Dev-C++
ProductVersion: 5
Comments: Under the GNU General Public License

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 29-Jun-2016 14:48:37
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000260BF
0x00027000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.48674
.rdata
0x00028000
0x0000A4AA
0x0000B000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.48539
.data
0x00033000
0x0000CD1C
0x0000A000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.23584
.rsrc
0x00040000
0x00004C56
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.5061
.reloc
0x00045000
0x0001D7BE
0x0001E000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
4.646

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.4167
852
UNKNOWN
English - United States
RT_VERSION
7
2.7403
202
UNKNOWN
UNKNOWN
RT_STRING
9
1.7593
62
UNKNOWN
UNKNOWN
RT_STRING
31
3.02695
308
UNKNOWN
Hebrew - Israel
RT_CURSOR
32
2.74274
180
UNKNOWN
Hebrew - Israel
RT_CURSOR
34
6.96696
3240
UNKNOWN
English - United States
RT_ICON
100
3.23533
356
UNKNOWN
UNKNOWN
RT_DIALOG
128
2.86383
18
UNKNOWN
UNKNOWN
UNKNOWN
2049
2.4724
132
UNKNOWN
UNKNOWN
RT_STRING
3585
2.10121
72
UNKNOWN
UNKNOWN
RT_STRING

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
OLEPRO32.DLL
SHELL32.dll
USER32.dll
WINSPOOL.DRV
comdlg32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start 1.exe #PHORPIEX sysmudt.exe 38720.exe #PHORPIEX sysrtvo.exe 39495.exe no specs 29433.exe 10506.exe

Process information

PID
CMD
Path
Indicators
Parent process
2956"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
explorer.exe
User:
admin
Company:
Bloodshed Software
Integrity Level:
MEDIUM
Description:
Dev-C++ IDE
Exit code:
0
Version:
4.9.9.2
2584C:\Users\admin\105827982\sysmudt.exeC:\Users\admin\105827982\sysmudt.exe
1.exe
User:
admin
Company:
Bloodshed Software
Integrity Level:
MEDIUM
Description:
Dev-C++ IDE
Exit code:
0
Version:
4.9.9.2
2468C:\Users\admin\AppData\Local\Temp\38720.exeC:\Users\admin\AppData\Local\Temp\38720.exe
sysmudt.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MFC-Anwendung Elliptic Button Demo
Exit code:
0
Version:
2, 0, 0, 0
3260C:\Users\admin\1929216923\sysrtvo.exeC:\Users\admin\1929216923\sysrtvo.exe
38720.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MFC-Anwendung Elliptic Button Demo
Version:
2, 0, 0, 0
3320C:\Users\admin\AppData\Local\Temp\39495.exeC:\Users\admin\AppData\Local\Temp\39495.exesysrtvo.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MFC-Anwendung Elliptic Button Demo
Exit code:
0
Version:
2, 0, 0, 0
724C:\Users\admin\AppData\Local\Temp\29433.exeC:\Users\admin\AppData\Local\Temp\29433.exe
sysrtvo.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MFC-Anwendung Elliptic Button Demo
Exit code:
0
Version:
2, 0, 0, 0
2148C:\Users\admin\AppData\Local\Temp\10506.exeC:\Users\admin\AppData\Local\Temp\10506.exe
sysrtvo.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MFC-Anwendung Elliptic Button Demo
Exit code:
0
Version:
2, 0, 0, 0
Total events
116
Read events
52
Write events
64
Delete events
0

Modification events

(PID) Process:(2956) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Windows Driver
Value:
C:\Users\admin\105827982\sysmudt.exe
(PID) Process:(2956) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Windows Driver
Value:
C:\Users\admin\105827982\sysmudt.exe
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
Operation:writeName:DisableAntiSpyware
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection
Operation:writeName:DisableScanOnRealtimeEnable
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection
Operation:writeName:DisableOnAccessProtection
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection
Operation:writeName:DisableBehaviorMonitoring
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:AntiVirusOverride
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:UpdatesOverride
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:FirewallOverride
Value:
1
(PID) Process:(2584) sysmudt.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Operation:writeName:AntiVirusDisableNotify
Value:
1
Executable files
11
Suspicious files
10
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
3260sysrtvo.exeC:\Users\admin\AppData\Local\Temp\15962.exebinary
MD5:7729F690060B86BD31325391E41BFC1D
SHA256:9E85E7CDC406F73745D3F3A79D71D4A91570068AF4D71F7D89D566B9A589E0BC
3260sysrtvo.exeC:\Users\admin\AppData\Local\Temp\39495.exebinary
MD5:E10B5163CA5B38FE286A5166EA37B40C
SHA256:8A6AFCFD4F14A3185299957C71EA878D33A881B71B19643E01A4EE21705DAFE3
3260sysrtvo.exeC:\Users\admin\AppData\Local\Temp\32126.exebinary
MD5:7729F690060B86BD31325391E41BFC1D
SHA256:9E85E7CDC406F73745D3F3A79D71D4A91570068AF4D71F7D89D566B9A589E0BC
72429433.exeC:\Users\admin\AppData\Local\Temp\10506.exeexecutable
MD5:4FC48D3CF758E9F33E2EDDEB43D36FE3
SHA256:8035A8BB8A5BC4C555641565EE8D194B747E929A68474CE78A194618BCF12D78
29561.exeC:\Users\admin\105827982\sysmudt.exeexecutable
MD5:F8DCF54AA841455DB600FD9DD5243727
SHA256:FA2993F2455971244350178008CC671FB739B53D79B594C80E69047421CE1666
3260sysrtvo.exeC:\Users\admin\AppData\Local\Temp\10506.exebinary
MD5:D2F84CA12208727C561642FD169F990B
SHA256:9345CA9CE96EF8C3DE1DD02B4354F14163B531F13316D81BA2FD1E7B7363DEBC
3260sysrtvo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\3[1]binary
MD5:A5E965AF01372010E38DDE3195738A51
SHA256:5BE0F8BD660F0D559762D6021A72459C2B554D8719668D23CCB031EA9EFEE66A
246838720.exeC:\Users\admin\1929216923\sysrtvo.exeexecutable
MD5:CD7D22C1B17695EE48CCBD31921F817B
SHA256:B2AB7405186AA88A72C21E7EF3A5FA5E9F0CA25AADFB49C80E8B09EA507BD054
3260sysrtvo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\5[1]binary
MD5:D2F84CA12208727C561642FD169F990B
SHA256:9345CA9CE96EF8C3DE1DD02B4354F14163B531F13316D81BA2FD1E7B7363DEBC
2584sysmudt.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\1[1]binary
MD5:E10B5163CA5B38FE286A5166EA37B40C
SHA256:8A6AFCFD4F14A3185299957C71EA878D33A881B71B19643E01A4EE21705DAFE3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
12
DNS requests
84
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2584
sysmudt.exe
GET
185.176.27.132:80
http://185.176.27.132/1
GB
malicious
2584
sysmudt.exe
GET
200
185.176.27.132:80
http://185.176.27.132/t.php?new=1
GB
malicious
3260
sysrtvo.exe
GET
185.176.27.132:80
http://185.176.27.132/5
GB
malicious
2584
sysmudt.exe
GET
200
193.32.161.73:80
http://193.32.161.73/t.php?new=1
unknown
malicious
3260
sysrtvo.exe
GET
185.176.27.132:80
http://185.176.27.132/2
GB
malicious
3260
sysrtvo.exe
GET
185.176.27.132:80
http://185.176.27.132/3
GB
malicious
3260
sysrtvo.exe
GET
304
185.176.27.132:80
http://185.176.27.132/1
GB
malicious
3260
sysrtvo.exe
GET
200
185.176.27.132:80
http://185.176.27.132/2
GB
binary
1.85 Mb
malicious
3260
sysrtvo.exe
GET
200
185.176.27.132:80
http://185.176.27.132/5
GB
binary
372 Kb
malicious
3260
sysrtvo.exe
GET
200
185.176.27.132:80
http://185.176.27.132/3
GB
binary
364 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3260
sysrtvo.exe
185.176.27.132:80
GB
malicious
2584
sysmudt.exe
185.176.27.132:80
GB
malicious
2584
sysmudt.exe
193.32.161.73:80
malicious
2584
sysmudt.exe
35.225.160.245:80
aeifaeifhutuhuhusl.cc
US
malicious
2584
sysmudt.exe
208.100.26.251:80
urusurofhsorhfuuhl.cc
Steadfast
US
suspicious
3260
sysrtvo.exe
208.100.26.251:80
urusurofhsorhfuuhl.cc
Steadfast
US
suspicious
2148
10506.exe
67.195.228.94:25
mta7.am0.yahoodns.net
Yahoo
US
unknown
3260
sysrtvo.exe
35.225.160.245:80
aeifaeifhutuhuhusl.cc
US
malicious

DNS requests

Domain
IP
Reputation
urusurofhsorhfuuhk.su
malicious
aeifaeifhutuhuhusk.su
unknown
rzhsudhugugfugugsk.su
unknown
bfagzzezgaegzgfaik.su
unknown
eaeuafhuaegfugeudk.su
unknown
aeufuaehfiuehfuhfk.su
malicious
daedagheauehfuuhfk.su
unknown
aeoughaoheguaoehdk.su
unknown
eguaheoghouughahsk.su
unknown
huaeokaefoaeguaehk.su
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2584
sysmudt.exe
Misc Attack
ET DROP Dshield Block Listed Source group 1
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
4 ETPRO signatures available at the full report
No debug info