Malware Analysis Report

2024-09-11 01:14

Sample ID 240401-tz97raaa67
Target 2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos
SHA256 3d42d7ba81d48f395ed578c63302ef2f5d44bc2e0dc7f3d775d25ed0db54ef33
Tags
phobos evasion persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3d42d7ba81d48f395ed578c63302ef2f5d44bc2e0dc7f3d775d25ed0db54ef33

Threat Level: Known bad

The file 2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos was found to be: Known bad.

Malicious Activity Summary

phobos evasion persistence ransomware spyware stealer

Phobos

Renames multiple (313) files with added filename extension

Deletes shadow copies

Modifies boot configuration data using bcdedit

Renames multiple (682) files with added filename extension

Modifies Windows Firewall

Deletes backup catalog

Reads user/profile data of web browsers

Drops startup file

Drops desktop.ini file(s)

Adds Run key to start application

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Interacts with shadow copies

Checks SCSI registry key(s)

Uses Volume Shadow Copy service COM API

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-01 16:30

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-01 16:30

Reported

2024-04-01 16:33

Platform

win7-20240221-en

Max time kernel

149s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (313) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos = "C:\\Users\\Admin\\AppData\\Local\\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe" C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos = "C:\\Users\\Admin\\AppData\\Local\\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe" C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F9UL0C6O\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LGZQH3SP\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\PY5FLSJ8\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3J2LRC5A\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CYTS71XD\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\wsdetect.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\ext.txt C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\mlib_image.dll.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\Words.pdf.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_XPS.DLL C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21308_.GIF C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh87.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\flyout.css C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\cursors.properties C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00116_.WMF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JAVA_01.MID.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\EXITEMS.ICO C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOMessageProvider.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.nl_zh_4.4.0.v20140623020002.jar.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02263_.WMF C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\ACTIVITL.ICO.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG_PAL.wmv C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\gadget.xml C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\MMSL.ICO C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\16.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02431_.WMF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_thunderstorm.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Kiritimati.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.net.nl_ja_4.4.0.v20140623020002.jar.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-visual.xml.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\Nassau.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libvdummy_plugin.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281638.WMF C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\AUTHOR.XSL.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\PAWPRINT.HTM.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\DVD Maker\de-DE\DVDMaker.exe.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21348_.GIF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\WinMail.exe.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_ja.jar.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\Managua.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\Accessible.tlb C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME25.CSS.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR26F.GIF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\System\ja-JP\wab32res.dll.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-options.jar C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonDown_On.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\form_edit.js.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.HTM.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\SoftBlue.jpg C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15155_.GIF C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\Office64MUI.XML.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-applemenu.jar C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\cpu.js C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02106_.GIF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_OFF.GIF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Madeira C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageSmall.jpg.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\settings.js C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OMSINTL.DLL C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\OrielFax.Dotx.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18216_.WMF.id[24A1C159-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2876 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2988 wrote to memory of 2588 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2988 wrote to memory of 2588 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2988 wrote to memory of 2588 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2740 wrote to memory of 2584 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2740 wrote to memory of 2584 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2740 wrote to memory of 2584 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2988 wrote to memory of 1776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2988 wrote to memory of 1776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2988 wrote to memory of 1776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2740 wrote to memory of 2684 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2740 wrote to memory of 2684 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2740 wrote to memory of 2684 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2740 wrote to memory of 360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2740 wrote to memory of 360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2740 wrote to memory of 360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2740 wrote to memory of 1856 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2740 wrote to memory of 1856 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2740 wrote to memory of 1856 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2740 wrote to memory of 1848 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2740 wrote to memory of 1848 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2740 wrote to memory of 1848 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2876 wrote to memory of 452 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 452 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 452 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 452 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 2876 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 2876 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 1804 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1804 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1804 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1804 wrote to memory of 556 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1804 wrote to memory of 556 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1804 wrote to memory of 556 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1804 wrote to memory of 2572 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1804 wrote to memory of 2572 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1804 wrote to memory of 2572 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1804 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1804 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1804 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1804 wrote to memory of 896 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1804 wrote to memory of 896 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1804 wrote to memory of 896 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe

"C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe"

C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe

"C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.id[24A1C159-3335].[[email protected]].HUNTER

MD5 6dbaa81294c72c55be59141738d79706
SHA1 588f816d7ae9a8a163f552a2dcc24e4058b826fe
SHA256 abf6a6703289bac38d393b2d10959610ea1c2653b7de9ee5f5483cd053b6410a
SHA512 20aeeb5602663f3aa4e38d26bec030bc4e39abade7fdb1ffb75a689f5eef428a1a27d9323b31927920d7f20ebecab3335c2740d0fa9d4f4d0758418f173fc79e

C:\info.hta

MD5 40dc5116a91122813c30504bc6c86d9c
SHA1 7fb2e251be6488524b26eef9a7d168961aa28584
SHA256 c0eddf4c42bd7aa64af1b97b6a691de9e74a1bdbff3b6fdd31ceac45aa979e15
SHA512 e625a93e5705e3d9a3de59fa080f8d9ac0ad51b4bab87507f4a5df08dbb3f7235eb4da74d3a63c286456cc961fbcb743dc505da1f65abef963b4677410e09e52

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-01 16:30

Reported

2024-04-01 16:33

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (682) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos = "C:\\Users\\Admin\\AppData\\Local\\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe" C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos = "C:\\Users\\Admin\\AppData\\Local\\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe" C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-locale-l1-1-0.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\cldr.md.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\Assets\AppSplashScreen.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawdv_plugin.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\createpdf.svg.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.cpl C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\PREVIEW.GIF.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\en-gb\locimages\offsymt.ttf C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\Controls\ErrorControl.xaml C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-125_contrast-black.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Runtime.Serialization.Xml.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOLoaderUI.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-ul-oob.xrm-ms.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-conio-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-pl.xrm-ms.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\WordCombinedFloatieModel.bin.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.Security.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\MoveToFolderToastQuickAction.scale-80.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-crt-heap-l1-1-0.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Globalization.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_hover.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\JitV.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderWideTile.contrast-white_scale-200.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageLargeTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinPageTemplates.xml C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxWideTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\ui-strings.js C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_US\README_en_US.txt.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\bin\eula.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\cs-cz\ui-strings.js.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\256x256.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\it-IT\mshwLatin.dll.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Java\jre-1.8\bin\ssvagent.exe.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\OsfTaskengine.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarMediumTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-64.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\plugin-selectors.css.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\fr\ReachFramework.resources.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\174.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\1851_40x40x32.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\TimerLargeTile.contrast-black_scale-200.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Net.Security.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\ja\UIAutomationClientSideProviders.resources.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\sat_logo.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.17\msedgeupdateres_az.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ppd.xrm-ms.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\gl\msipc.dll.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-core-timezone-l1-1-0.dll.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\multi-tab-file-view-2x.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-sysinfo-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_altform-unplated_contrast-black.png C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Controls\Xbox360PurchaseControl.xaml C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\Locales\fr-CA.pak.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\MySharePoints.ico C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sv-se\ui-strings.js.id[643A5F4B-3335].[[email protected]].HUNTER C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
File opened for modification C:\Program Files\Internet Explorer\ja-JP\ieinstal.exe.mui C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName C:\Windows\System32\vds.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4384 wrote to memory of 1556 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 4384 wrote to memory of 1556 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 4384 wrote to memory of 4608 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 4384 wrote to memory of 4608 N/A C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe C:\Windows\system32\cmd.exe
PID 4608 wrote to memory of 2212 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4608 wrote to memory of 2212 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1556 wrote to memory of 180 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1556 wrote to memory of 180 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4608 wrote to memory of 3568 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4608 wrote to memory of 3568 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1556 wrote to memory of 2120 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1556 wrote to memory of 2120 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1556 wrote to memory of 112 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1556 wrote to memory of 112 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1556 wrote to memory of 4200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1556 wrote to memory of 4200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1556 wrote to memory of 2028 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1556 wrote to memory of 2028 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe

"C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe"

C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe

"C:\Users\Admin\AppData\Local\Temp\2024-04-01_442d4e80550a6e0dc210a7fb7ee43f3c_phobos.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3920 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 149.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 172.217.16.234:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 234.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.178.89.13.in-addr.arpa udp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id[643A5F4B-3335].[[email protected]].HUNTER

MD5 f9c98dc302d1c9c4ec643af2271ec9db
SHA1 3d6a19829b9f2e4660763dc9c2a889f2a780f9bf
SHA256 7dbf8fcde4d88368ac12fee330d194246312ff41f5985200bcc40c47dde5cd8b
SHA512 fd055f2d4ee0846c468f4dc5b8464fab261934393aec1aa27a9020915ec4646f2af988a8c7d8af1c3903d10ae90d6551dee806800fa557b61044f98dbfdbeee6