Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-03-01_ac88dc513f3c40b24777d3b14355ca0e_phobos
-
Size
51KB
-
Sample
250301-je915svshw
-
MD5
ac88dc513f3c40b24777d3b14355ca0e
-
SHA1
2c443bfd6e5a0df8d2f06f75a83d86d8c044774b
-
SHA256
d3d3f6140e1ee794dd28013405265acdd7f5deb0afd6fc78ce63a32f91a29a13
-
SHA512
6ef375b8ba044fafd30723a582c54805434d8617d51e2c4f23bd050bc7dba264933746a87c98ca45b6ae904585963514be10e648b4795d7d6e9e924189e02157
-
SSDEEP
1536:GRvoU+XfE9ICf4t1OwruWiyB0VRm0el05:G6X89NfsjruWiyyMLl05
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-01_ac88dc513f3c40b24777d3b14355ca0e_phobos.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-01_ac88dc513f3c40b24777d3b14355ca0e_phobos.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
2025-03-01_ac88dc513f3c40b24777d3b14355ca0e_phobos
-
Size
51KB
-
MD5
ac88dc513f3c40b24777d3b14355ca0e
-
SHA1
2c443bfd6e5a0df8d2f06f75a83d86d8c044774b
-
SHA256
d3d3f6140e1ee794dd28013405265acdd7f5deb0afd6fc78ce63a32f91a29a13
-
SHA512
6ef375b8ba044fafd30723a582c54805434d8617d51e2c4f23bd050bc7dba264933746a87c98ca45b6ae904585963514be10e648b4795d7d6e9e924189e02157
-
SSDEEP
1536:GRvoU+XfE9ICf4t1OwruWiyB0VRm0el05:G6X89NfsjruWiyyMLl05
-
Phobos family
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Renames multiple (155) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1