Malware Analysis Report

2024-09-11 01:17

Sample ID 240414-jwlpwaeg74
Target phobos.bin
SHA256 a91491f45b851a07f91ba5a200967921bf796d38677786de51a4a8fe5ddeafd2
Tags
phobos evasion persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a91491f45b851a07f91ba5a200967921bf796d38677786de51a4a8fe5ddeafd2

Threat Level: Known bad

The file phobos.bin was found to be: Known bad.

Malicious Activity Summary

phobos evasion persistence ransomware spyware stealer

Phobos

Deletes shadow copies

Renames multiple (705) files with added filename extension

Renames multiple (311) files with added filename extension

Modifies boot configuration data using bcdedit

Modifies Windows Firewall

Checks computer location settings

Reads user/profile data of web browsers

Drops startup file

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Interacts with shadow copies

Modifies Internet Explorer settings

Uses Volume Shadow Copy service COM API

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Modifies registry class

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-14 08:01

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-14 08:01

Reported

2024-04-14 08:03

Platform

win7-20240221-en

Max time kernel

149s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\phobos.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (311) files with added filename extension

ransomware

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\phobos.exe C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\phobos = "C:\\Users\\Admin\\AppData\\Local\\phobos.exe" C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\phobos = "C:\\Users\\Admin\\AppData\\Local\\phobos.exe" C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\HKGE1S7K\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQ9N4B3U\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\87XXOISN\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JSZQNXMR\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FXU0E4DR\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CYXNIRQN\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\settings.js C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\vlc.mo.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libugly_resampler_plugin.dll.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows Media Player\es-ES\wmlaunch.exe.mui C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Discussion14.gta C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\UCT.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Australia\Sydney.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02740G.GIF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\cmm\sRGB.pf C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.dll.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_choosecolor.gif.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\29.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_snow.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01170_.WMF.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00361_.WMF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Hand Prints.htm C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Asia\Magadan.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows Media Player\WMPDMC.exe C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\net.properties C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libadjust_plugin.dll.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libblend_plugin.dll.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Sts.css.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Entity.Design.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\settings.css C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Pangnirtung C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293234.WMF.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Elegant.dotx C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MUAUTH.CAB.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageMask.bmp.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBPQT.XML.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console.nl_ja_4.4.0.v20140623020002.jar.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287415.WMF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\vlc.mo C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_few-showers.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-dialogs.jar.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_ja.jar.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\Solitaire.exe.mui C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\TipBand.dll.mui C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.xml C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\SETUP.XML C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\M1033DSK.CRT C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PROG98.POC C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\mip.exe.mui C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_OFF.GIF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SIGN.CFG.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00543_.WMF.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Atikokan C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows Mail\wabmig.exe C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Yakutat C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\modules\dkjson.luac.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\METCONV.DLL C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\1047x576black.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceAmharic.txt C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199469.WMF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00195_.WMF.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01015_.WMF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02074U.BMP.id[A8E39828-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libsvcdsub_plugin.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1968 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 2548 wrote to memory of 2676 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2548 wrote to memory of 2676 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2548 wrote to memory of 2676 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2624 wrote to memory of 2632 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2624 wrote to memory of 2632 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2624 wrote to memory of 2632 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2624 wrote to memory of 2200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2624 wrote to memory of 2200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2624 wrote to memory of 2200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2548 wrote to memory of 2612 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2548 wrote to memory of 2612 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2548 wrote to memory of 2612 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2548 wrote to memory of 2256 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2548 wrote to memory of 2256 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2548 wrote to memory of 2256 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2548 wrote to memory of 1476 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2548 wrote to memory of 1476 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2548 wrote to memory of 1476 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1968 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1300 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1300 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1300 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 1300 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 2760 wrote to memory of 1712 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2760 wrote to memory of 1712 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2760 wrote to memory of 1712 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2760 wrote to memory of 2240 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2760 wrote to memory of 2240 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2760 wrote to memory of 2240 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2760 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2760 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2760 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2760 wrote to memory of 1692 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2760 wrote to memory of 1692 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2760 wrote to memory of 1692 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\phobos.exe

"C:\Users\Admin\AppData\Local\Temp\phobos.exe"

C:\Users\Admin\AppData\Local\Temp\phobos.exe

"C:\Users\Admin\AppData\Local\Temp\phobos.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.id[A8E39828-1096].[[email protected]].acute

MD5 1c4649acd7e068cbba01e11c5518126a
SHA1 eab136940a8fe6af84fe02adbf57627d7d267f01
SHA256 bee0e64822a3961d77cbba34afedaa9cc20c58c5c734ca86439749f7ae009fc3
SHA512 eb75d0c0369712765513e6a1e6104f3077cbaf7ccffb2af5f9cb6612733d058a71090887505a4323d3310372441d8f544e1bef56a8fbe6fe9d8b2cdf14a63a84

C:\info.hta

MD5 af4b885c070226f552a8aeb9425a0b28
SHA1 64b3b00cee4fbf5383955679bef184763591073c
SHA256 66d55834590cdb9fd0daeea9682fe9f6d8ef00e9a1843d5673a3224cb6ac5122
SHA512 16b4369e62d7af98d54e55dc3b5cb86a637cc760a62bc50711313738c6f9215eb40f318b0d83571c1a15ce39ad6820118c3ce8b7a5722e3048eb8ec0cb319d15

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-14 08:01

Reported

2024-04-14 08:03

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\phobos.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (705) files with added filename extension

ransomware

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Drops startup file

Description Indicator Process Target
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\phobos.exe C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\phobos = "C:\\Users\\Admin\\AppData\\Local\\phobos.exe" C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\phobos = "C:\\Users\\Admin\\AppData\\Local\\phobos.exe" C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeLogo.scale-200_contrast-white.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\7739_32x32x32.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-400_contrast-white.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libvnc_plugin.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-16_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libcache_block_plugin.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jre-1.8\legal\jdk\dynalink.md.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\application.ini C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-96_altform-unplated_contrast-white.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-time-l1-1-0.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SLATE\SLATE.INF C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Design.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\AppxSignature.p7x C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\ResiliencyLinks\Locales\hr.pak.DATA C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk-1.8\legal\jdk\zlib.md.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_6_Loud.m4a C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-16_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\PROOF\LTSHYPH_ES.LEX.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\help.svg.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\Microsoft.PackageManagement.MetaProvider.PowerShell.resources.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\msvcp140.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\Locales\az.pak.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_agreement_filetype.svg.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\redact_poster.jpg.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SpeedSelectionSlider.xbf C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_altform-unplated_contrast-black.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\XLMACRO.CHM C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-80_contrast-white.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ko-kr\ui-strings.js C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.excelmui.msi.16.en-us.xml C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageWideTile.scale-100_contrast-black.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyCalendarSearch-Dark.scale-100.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\ko\System.Windows.Input.Manipulations.resources.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\System.Windows.Presentation.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-64_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-white_targetsize-40.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\logo_retina.png.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\MSFT_PackageManagement.schema.mof C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\cryptocme.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageMedTile.scale-125.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Grace-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\Locales\ug.pak.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\bin\glib-lite.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\LargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\AddressBook2x.png C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Entity.dll C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_sr-Latn.json C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\MSSOAPR3.DLL.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Curve25519Wrap.winmd C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART6.BDR C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ppd.xrm-ms.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Windows Media Player\uk-UA\wmpnetwk.exe.mui C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\it\System.Windows.Forms.resources.dll.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\offlineUtilities.js C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTest-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview_selected-hover.svg C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sv-se\ui-strings.js.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\selector.js C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\Trust Protection Lists\Mu\Social.id[C02C545F-1096].[[email protected]].acute C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 656 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 656 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 656 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 656 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 4612 wrote to memory of 4084 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4612 wrote to memory of 4084 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3392 wrote to memory of 3572 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3392 wrote to memory of 3572 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4612 wrote to memory of 3796 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4612 wrote to memory of 3796 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3392 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3392 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3392 wrote to memory of 232 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3392 wrote to memory of 232 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3392 wrote to memory of 4508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3392 wrote to memory of 4508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 656 wrote to memory of 3064 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 3064 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 3064 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 3656 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 3656 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 3656 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 1456 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 1456 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 1456 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\SysWOW64\mshta.exe
PID 656 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 656 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\phobos.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2028 wrote to memory of 1200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2028 wrote to memory of 1720 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2028 wrote to memory of 1720 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2028 wrote to memory of 1424 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2028 wrote to memory of 1424 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2028 wrote to memory of 968 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2028 wrote to memory of 968 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\phobos.exe

"C:\Users\Admin\AppData\Local\Temp\phobos.exe"

C:\Users\Admin\AppData\Local\Temp\phobos.exe

"C:\Users\Admin\AppData\Local\Temp\phobos.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.187.202:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 202.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 24.139.73.23.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 154.141.79.40.in-addr.arpa udp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id[C02C545F-1096].[[email protected]].acute

MD5 5d9ab6a94529e8a67aae06cadf275f94
SHA1 484ba529cb4f9368606ccba9f3f8aa40300eeb35
SHA256 d6804f07d2ba00b1e98a59898cae579bca9642bed6a18c9eb9e57f5347d76899
SHA512 4b7d7788872db0f94da75b35957b208a8e69a5a229fb72f549ba8eb93da91355508bfe206bf2e85a8de8acdb35674460081e1f8db6efc54d1c7524a8e67ce6eb

C:\info.hta

MD5 dcd05ddb8ba8d6ac356f538f0906b779
SHA1 56cd55e3011617b614376cf5dc9ea307698c28c0
SHA256 50527238f6341ceb2934ee24e42b06777b2fc97e65aa159f2d18190cd7639010
SHA512 59b88706520ae9d7e46929fb4eaa2f6200eee1881f39d8a50316c1953810970cefed2592576a1a81f99270d8de57c7ca6e153b34cd91631d1bc9b4c101c296f7