Malware Analysis Report

2024-09-11 01:17

Sample ID 240531-ptg7kahf89
Target 202405315ead2a024b88bbb4b37cd50501b77b7fphobos
SHA256 4dddfd8d5d0a097700ec211ed5ff49ae6dc0426f1dcb0c97b13da0acffe09216
Tags
phobos defense_evasion evasion execution impact persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4dddfd8d5d0a097700ec211ed5ff49ae6dc0426f1dcb0c97b13da0acffe09216

Threat Level: Known bad

The file 202405315ead2a024b88bbb4b37cd50501b77b7fphobos was found to be: Known bad.

Malicious Activity Summary

phobos defense_evasion evasion execution impact persistence ransomware spyware stealer

Phobos

Renames multiple (315) files with added filename extension

Renames multiple (525) files with added filename extension

Modifies boot configuration data using bcdedit

Deletes shadow copies

Modifies Windows Firewall

Deletes backup catalog

Checks computer location settings

Drops startup file

Reads user/profile data of web browsers

Drops desktop.ini file(s)

Adds Run key to start application

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Modifies Internet Explorer settings

Interacts with shadow copies

Modifies registry class

Checks SCSI registry key(s)

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Uses Volume Shadow Copy service COM API

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-31 12:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-31 12:37

Reported

2024-05-31 12:39

Platform

win7-20240508-en

Max time kernel

150s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware defense_evasion impact execution

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (315) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\202405315ead2a024b88bbb4b37cd50501b77b7fphobos = "C:\\Users\\Admin\\AppData\\Local\\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe" C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\202405315ead2a024b88bbb4b37cd50501b77b7fphobos = "C:\\Users\\Admin\\AppData\\Local\\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe" C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\1D5U9W0O\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5Z74IJYR\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\X7K1QVVO\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\03PVXV8P\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SKAMU6WE\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\setup.ini.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_ja_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2iexp.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00175_.GIF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02161_.WMF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_COL.HXC.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\OOFL.ICO C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\SignedManagedObjects.cer C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Common Files\System\Ole DB\sqloledb.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)alertIcon.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_fr.dub.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.docs.zh_CN_5.5.0.165303.jar C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_zh_CN.jar C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\slideShow.js C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151581.WMF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152694.WMF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR46B.GIF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\VelvetRose.css C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\GMT.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jre7\lib\accessibility.properties.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00170_.WMF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\POSTS.ICO.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-windows_zh_CN.jar.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Office14\ONBttnIELinkedNotes.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FLAP.WMF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195320.WMF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN089.XML.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-multitabs.jar.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02115_.WMF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_COL.HXC C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\weather.js C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240175.WMF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\logger\libfile_logger_plugin.dll.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libblend_plugin.dll.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Services.Design.resources.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\6.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\codec\libsubsdec_plugin.dll.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\bckgzm.exe.mui C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\BASMLA.XSL C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FRENCH.LNG C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\Winamac.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\MUSIC_01.MID.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\STUBBY2.WMF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00218_.WMF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14793_.GIF.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sa.jar C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextService.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21480_.GIF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\tab_off.gif.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SOA.DLL C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.bidi_0.10.0.v20130327-1442.jar C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Pacific\Bougainville.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\settings.html C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\ECHO.ELM.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Module.eftx C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsBlankPage.html.id[8FEC2384-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Denver C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\wmpnssci.dll.mui C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1780 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 2120 wrote to memory of 2828 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2120 wrote to memory of 2828 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2120 wrote to memory of 2828 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2968 wrote to memory of 2724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2968 wrote to memory of 2724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2968 wrote to memory of 2724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2968 wrote to memory of 2832 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2968 wrote to memory of 2832 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2968 wrote to memory of 2832 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2120 wrote to memory of 2876 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2120 wrote to memory of 2876 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2120 wrote to memory of 2876 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2120 wrote to memory of 1484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2120 wrote to memory of 1484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2120 wrote to memory of 1484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2120 wrote to memory of 2040 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2120 wrote to memory of 2040 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2120 wrote to memory of 2040 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2120 wrote to memory of 2824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2120 wrote to memory of 2824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2120 wrote to memory of 2824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1780 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 1780 wrote to memory of 872 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 872 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 872 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1780 wrote to memory of 872 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 872 wrote to memory of 1520 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 872 wrote to memory of 1520 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 872 wrote to memory of 1520 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 872 wrote to memory of 2728 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 872 wrote to memory of 2728 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 872 wrote to memory of 2728 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 872 wrote to memory of 1724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 872 wrote to memory of 1724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 872 wrote to memory of 1724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 872 wrote to memory of 2024 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 872 wrote to memory of 2024 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 872 wrote to memory of 2024 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 872 wrote to memory of 3032 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 872 wrote to memory of 3032 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 872 wrote to memory of 3032 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe

"C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe"

C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe

"C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

N/A

Files

C:\info.hta

MD5 6ff2e704af64f3ac54cdc9ca13a11d38
SHA1 4f19d9d87301042b3082cbeab0c318209a5cfe36
SHA256 4154fd65145ce3a7dcd378e453e130acd32182337ef15d7d1783b67fa4ae8255
SHA512 59cb8555f8875a817ce3474e08623d077d0e0f2443e686c7816b4e6a8893f4d8180b705b0a840baaa42cf8ae2185e6c78d12c6fb212618e71f61e875153bd4d4

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-31 12:37

Reported

2024-05-31 12:39

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware defense_evasion impact execution

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (525) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Drops startup file

Description Indicator Process Target
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\202405315ead2a024b88bbb4b37cd50501b77b7fphobos = "C:\\Users\\Admin\\AppData\\Local\\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe" C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\202405315ead2a024b88bbb4b37cd50501b77b7fphobos = "C:\\Users\\Admin\\AppData\\Local\\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe" C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-convert-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\PeopleAppStoreLogo.scale-100.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-en_us_2x.gif.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\7-Zip\Lang\fa.txt.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\th-TH\View3d\3DViewerProductDescription-universal.xml C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailMediumTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PDDom.api.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_18.svg C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql70.xsl C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\AppxSignature.p7x C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSplashLogo.scale-400.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-24_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\PREVIEW.GIF C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-140.png.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ACEODATASERVICE.DLL.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\logo.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\close.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\de-de\ui-strings.js.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-oob.xrm-ms.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\cpdf\selector.js C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupMedTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\THEMES.INF.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ogg_plugin.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libgl_plugin.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MotionController_Diagram_Lines.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-24.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\[email protected] C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\PresentationUI.resources.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreWideTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\SearchEmail.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSO99LRES.DLL.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-30_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\ui-strings.js C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\7-Zip\7-zip32.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Http.Json.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Numerics.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SyncFusion.Shared.Windows.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.scale-200.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\7-Zip\Lang\tr.txt.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\WindowsBase.resources.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\LargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Retail-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\StoreLogo.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-256.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\LinkedInboxMediumTile.scale-400.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationTypes.resources.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Input.Manipulations.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.Speech.resources.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\UIAutomationTypes.resources.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Forms.Design.resources.dll C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\BloodPressureTracker.xltx C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_TileSmallSquare.scale-200.png C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\css\main-selector.css C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nl-nl\ui-strings.js C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\PresentationFramework.Classic.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-180.png.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\rename.svg C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\UIAutomationClientSideProviders.resources.dll.id[4E3D5D49-3506].[[email protected]].Lexus C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 C:\Windows\System32\vds.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3324 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 3324 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 3324 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 3324 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 1936 wrote to memory of 924 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1936 wrote to memory of 924 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 956 wrote to memory of 2224 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 956 wrote to memory of 2224 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1936 wrote to memory of 1512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1936 wrote to memory of 1512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 956 wrote to memory of 3332 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 956 wrote to memory of 3332 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 956 wrote to memory of 3216 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 956 wrote to memory of 3216 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 956 wrote to memory of 2300 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 956 wrote to memory of 2300 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 956 wrote to memory of 4368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 956 wrote to memory of 4368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 3324 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\SysWOW64\mshta.exe
PID 3324 wrote to memory of 3472 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 3324 wrote to memory of 3472 N/A C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe C:\Windows\system32\cmd.exe
PID 3472 wrote to memory of 4508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3472 wrote to memory of 4508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3472 wrote to memory of 1436 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3472 wrote to memory of 1436 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3472 wrote to memory of 2044 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3472 wrote to memory of 2044 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3472 wrote to memory of 464 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3472 wrote to memory of 464 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3472 wrote to memory of 2848 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 3472 wrote to memory of 2848 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe

"C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe"

C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe

"C:\Users\Admin\AppData\Local\Temp\202405315ead2a024b88bbb4b37cd50501b77b7fphobos.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.id[4E3D5D49-3506].[[email protected]].Lexus

MD5 932f2afe352491182a6e3f5820d032ed
SHA1 58e59d8998165ef9c72ef0d6931b27a981738be7
SHA256 6a45d873925595e984a6a3fbd9cc40539bfea50de5c03949263413138968771a
SHA512 cd82fb1308c20caea260a7241b5d680a473067aaddb7de2fb408e3e7c00d2aaf9146cc22ec044485e52aeb35bf4a635fcbfe96439847eef127ba7f8f15121e58

C:\info.hta

MD5 77a2996399d20c4650e2986f885d514d
SHA1 525d8a50139653cfa8e3c2200a6081c6429fec0f
SHA256 2f4005841554e62c8d0935da683bb84b16528f3f4ccb1291f718d8150b51eb82
SHA512 182e146e97df17df7050da35d0434c3d6e03aef9b5986fd441e5e16cfb5e39b83316dbc010ad545af70f26a54c8705c5e74817b3e809fe5ea7a51c45f37686c6