Static task
static1
Behavioral task
behavioral1
Sample
phobos.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
phobos.exe
Resource
win10v2004-20240226-en
General
-
Target
phobos.bin
-
Size
71KB
-
MD5
e59ffeaf7acb0c326e452fa30bb71a36
-
SHA1
c88fad293256bfead6962124394de4f8b97765aa
-
SHA256
a91491f45b851a07f91ba5a200967921bf796d38677786de51a4a8fe5ddeafd2
-
SHA512
737937ac074b1754878f9548be0fae43a18b88ed669a5626468763577d254ef4cd833686d3b9ed5a3169eb8dd1593ca03a74f5ba4664ccc1446d9b85d2f316b3
-
SSDEEP
1536:zkGB8nHbKUvryElSpi8jCZGcqDKlKnr8dV+99rmuoENA4Cj:zFBMHRvrAjCZmKcnr8YrfA4Cj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource phobos.bin
Files
-
phobos.bin.exe windows:5 windows x86 arch:x86
e6984e72559f94ba7deb365bcd2bee8a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
htonl
kernel32
WaitForMultipleObjects
CloseHandle
CreateThread
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
ResetEvent
CreateEventW
DeleteCriticalSection
CreateMutexW
CreateProcessW
GetCurrentProcess
SetHandleInformation
OpenProcess
GetLocaleInfoW
TerminateProcess
OpenMutexW
GetProcAddress
Process32FirstW
GetExitCodeThread
CreatePipe
CreateFileW
GetModuleHandleA
CreateToolhelp32Snapshot
ReleaseMutex
GetVersion
GetVolumeInformationW
ExpandEnvironmentStringsW
GetModuleFileNameW
FindClose
FindNextFileW
FindFirstFileW
SetEndOfFile
SetFilePointerEx
GetFileAttributesW
ReadFile
GetFileSizeEx
MoveFileW
DeleteFileW
SetFileAttributesW
IsDebuggerPresent
CopyFileW
Sleep
TerminateThread
HeapSize
WriteFile
GetTickCount
GetLogicalDrives
GetComputerNameW
WaitForSingleObject
LoadLibraryW
MultiByteToWideChar
RtlUnwind
Process32NextW
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
DecodePointer
GetStdHandle
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
DuplicateTokenEx
CryptDecrypt
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptAcquireContextW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE