Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-01-29_3eebec90ce03fbe704b993f0e3020fea_phobos
-
Size
50KB
-
Sample
250129-mhf41svqdx
-
MD5
3eebec90ce03fbe704b993f0e3020fea
-
SHA1
63f1f3494def1198f87d853c86787172cb06d5ce
-
SHA256
10096d953eff7ab6ab41c43c3b87cbadcf86d83f70963208c621c9e71ed22f38
-
SHA512
769516d9e6b1956b9e7323b4bdc2a3fd542d897e3abbf341e611d37f002b7dbb1c274f5ad298decbfa4bab9362972501aa34c307e42ace8610f223d6c3641865
-
SSDEEP
768:bgZRUSqFU+qJck+fO+lJ8f9ICGjI4t1hg0v861NR/uWiuKBUnLR0cAApDcvDFg04:cRvoU+XfE9ICf4t1OwruWiyR0GAvbY5
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_3eebec90ce03fbe704b993f0e3020fea_phobos.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-29_3eebec90ce03fbe704b993f0e3020fea_phobos.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
2025-01-29_3eebec90ce03fbe704b993f0e3020fea_phobos
-
Size
50KB
-
MD5
3eebec90ce03fbe704b993f0e3020fea
-
SHA1
63f1f3494def1198f87d853c86787172cb06d5ce
-
SHA256
10096d953eff7ab6ab41c43c3b87cbadcf86d83f70963208c621c9e71ed22f38
-
SHA512
769516d9e6b1956b9e7323b4bdc2a3fd542d897e3abbf341e611d37f002b7dbb1c274f5ad298decbfa4bab9362972501aa34c307e42ace8610f223d6c3641865
-
SSDEEP
768:bgZRUSqFU+qJck+fO+lJ8f9ICGjI4t1hg0v861NR/uWiuKBUnLR0cAApDcvDFg04:cRvoU+XfE9ICf4t1OwruWiyR0GAvbY5
-
Phobos family
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Renames multiple (84) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1