| File name: | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe |
| Full analysis: | https://app.any.run/tasks/828e0a99-a4c4-41b4-8b77-e28121d8b71a |
| Verdict: | Malicious activity |
| Threats: | Phobos is a ransomware that locks or encrypts files to demand a ransom. It uses AES encryption with different extensions, which leaves no chance to recover the infected files. |
| Analysis date: | April 26, 2025, 15:34:45 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections |
| MD5: | 7166D39E9C1CB17E1728D316531242B1 |
| SHA1: | D05810943685BCD70999FF0926215F5D6FE2637A |
| SHA256: | 8879A7A950A3916F5438685F994EE829A20E4C60021DB73060CD078E4A72B5A7 |
| SSDEEP: | 3072:0OLdjvSZkJXvtv+HQ7kvQ4sn++DXmHz5ALy:RLdTS6Xvd+HQ7kvQ44Ly |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:09:17 22:52:50+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 137728 |
| InitializedDataSize: | 781312 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x47f7 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 71.0.0.0 |
| ProductVersionNumber: | 34.0.0.0 |
| FileFlagsMask: | 0x141a |
| FileFlags: | (none) |
| FileOS: | Unknown (0x20761) |
| ObjectFileType: | Unknown |
| FileSubtype: | - |
| LanguageCode: | Faeroese |
| CharacterSet: | Unknown (31F2) |
| InternalName: | Huckleamber |
| FileDescription: | Underweather |
| ProductsVersion: | 59.46.64.93 |
| ProductName: | GoldenSeg |
| ProductionVersion: | 74.58.95.46 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2284 | bcdedit /set {default} recoveryenabled no | C:\Windows\System32\bcdedit.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Boot Configuration Data Editor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2392 | vssadmin delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2852 | wbadmin delete catalog -quiet | C:\Windows\System32\wbadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® BLB Backup Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3768 | C:\WINDOWS\System32\vdsldr.exe -Embedding | C:\Windows\System32\vdsldr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Virtual Disk Service Loader Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4488 | netsh advfirewall set currentprofile state off | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5008 | netsh firewall set opmode mode=disable | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5404 | C:\WINDOWS\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5720 | wmic shadowcopy delete | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6456 | "C:\Users\admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe" | C:\Users\admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 7148 | bcdedit /set {default} bootstatuspolicy ignoreallfailures | C:\Windows\System32\bcdedit.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Boot Configuration Data Editor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6456) 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 |
Value: C:\Users\admin\AppData\Local\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | |||
| (PID) Process: | (6456) 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 |
Value: C:\Users\admin\AppData\Local\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | |||
| (PID) Process: | (7764) 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 |
Value: C:\Users\admin\AppData\Local\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | |||
| (PID) Process: | (7764) 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 |
Value: C:\Users\admin\AppData\Local\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | |||
| (PID) Process: | (7148) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (7148) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002 |
| Operation: | write | Name: | Element |
Value: \EFI\Microsoft\Boot\bootmgfw.efi | |||
| (PID) Process: | (7148) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (7148) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001 |
| Operation: | write | Name: | Element |
Value: 0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000 | |||
| (PID) Process: | (7148) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\12000002 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (7148) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\12000002 |
| Operation: | write | Name: | Element |
Value: \EFI\Boot\Loader.efi | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:4F3FEA5322B24161C7D2764C45FB3442 | SHA256:60D51B4FF4F36335F441DF4D0CD036503AFD80218EB2C1E393A8C38BA3DF2E6F | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:AE6B872AEF76A61F4436CBB75C308906 | SHA256:B92A1026F6596062F8BD49B13848BC1673C4D12DAEFEFCF9CFFA8E667DAC8084 | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | executable | |
MD5:7166D39E9C1CB17E1728D316531242B1 | SHA256:8879A7A950A3916F5438685F994EE829A20E4C60021DB73060CD078E4A72B5A7 | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | executable | |
MD5:7166D39E9C1CB17E1728D316531242B1 | SHA256:8879A7A950A3916F5438685F994EE829A20E4C60021DB73060CD078E4A72B5A7 | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:EECDCC08E260FDD36DD9FF5B876CEF6E | SHA256:2C30CB606867E569A1CC6E72AF780B3FA6E0BFC9AAFAEC63BA93A72CC66661F3 | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:767CFF0A15BCCB7E916DA26AF24BDDD3 | SHA256:754564CD780635E9692685284DC2AEAB1B4C38BE898E30F30B031B06372A5A3B | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:A1586CF484DFD3C8915B2DDD71A72B26 | SHA256:E448C864AD56A4DB5D83C37934161A7352FB10899AB1A56ACAFBAFD591DDE9FF | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\chrome_200_percent.pak.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:F64F02B186D42DEAAF841AB493D20BEA | SHA256:49BF39791E579C312408F252553B7042F4158D3FDBFC4047C9BB3DC37C8CFA99 | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\LICENSE.txt.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:06E20D8805DCBB597E4CE1537A3E93C8 | SHA256:76F0A31CACF6A4FA706915D794363DEF80326B64DE4472E0C73D49E2938A3F10 | |||
| 6456 | 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\chrome_100_percent.pak.id[26B799FA-3483].[support@rexsdata.pro].8base | binary | |
MD5:048540BFE476F45B58D10F767BBF02BF | SHA256:3386E75AC58A0243C5946770F8F7977769F49937CEF9758465A79BA29AA5BEA1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 92.122.244.32:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 95.101.89.217:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 23.54.251.198:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 95.101.89.217:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
8004 | SIHClient.exe | GET | 200 | 95.101.89.217:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
8004 | SIHClient.exe | GET | 200 | 95.101.89.217:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 92.122.244.32:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 95.101.89.217:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 95.101.89.217:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.14:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 23.54.251.198:80 | ocsp.digicert.com | AKAMAI-AS | JP | whitelisted |
2112 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |