Analysis
-
max time kernel
46s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe
Resource
win10v2004-20220721-en
General
-
Target
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe
-
Size
664KB
-
MD5
acf73cf8ddfb182b8559779f8a165e49
-
SHA1
d944a1bc327f26b8c17345d04986ef0437d85484
-
SHA256
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef
-
SHA512
284a26b9165b58c9a531364bb7609abdc38868efd38878b0cdf78bed45ef0ee73a83719ec972ee86416dddc0e9ab698ed387537e12c9aed75d81ad817a3c8fd0
Malware Config
Signatures
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Drops startup file 1 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef = "C:\\Users\\Admin\\AppData\\Local\\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe" aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef = "C:\\Users\\Admin\\AppData\\Local\\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe" aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\desktop.ini aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exeaa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exedescription pid process target process PID 1172 set thread context of 1476 1172 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1992 set thread context of 1700 1992 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exepid process 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exeaa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exepid process 1172 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe 1992 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exeaa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exeaa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.execmd.exedescription pid process target process PID 1172 wrote to memory of 1476 1172 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1172 wrote to memory of 1476 1172 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1172 wrote to memory of 1476 1172 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1172 wrote to memory of 1476 1172 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1992 wrote to memory of 1700 1992 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1992 wrote to memory of 1700 1992 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1992 wrote to memory of 1700 1992 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1992 wrote to memory of 1700 1992 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe PID 1476 wrote to memory of 1440 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe cmd.exe PID 1476 wrote to memory of 1440 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe cmd.exe PID 1476 wrote to memory of 1440 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe cmd.exe PID 1476 wrote to memory of 1440 1476 aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe cmd.exe PID 1440 wrote to memory of 1928 1440 cmd.exe netsh.exe PID 1440 wrote to memory of 1928 1440 cmd.exe netsh.exe PID 1440 wrote to memory of 1928 1440 cmd.exe netsh.exe PID 1440 wrote to memory of 1724 1440 cmd.exe netsh.exe PID 1440 wrote to memory of 1724 1440 cmd.exe netsh.exe PID 1440 wrote to memory of 1724 1440 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe"C:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exeC:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe"C:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exeC:\Users\Admin\AppData\Local\Temp\aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef.exe"4⤵PID:1700
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off4⤵
- Modifies Windows Firewall
PID:1928
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
- Modifies Windows Firewall
PID:1724
-
-
-