Analysis
-
max time kernel
148s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe
Resource
win10v2004-20221111-en
General
-
Target
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe
-
Size
147KB
-
MD5
9d2caebe539c08a5809d04a1b4a17700
-
SHA1
625ef938725d9a70b45a47273ed7cde84cef4ea5
-
SHA256
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f
-
SHA512
1151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97
-
SSDEEP
3072:jdWfG6HPtQ+4VbLqXd79pqp1j1JAlYaeUbcA+Mx/i8pjHUafB:j96HPtQ+4Vbmdxgj7VaeUJ7xhHUaZ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
mobogenie.exemobogenie.exepid process 4248 mobogenie.exe 4660 mobogenie.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mobogenie.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MoboGenie = "\"C:\\windows\\mobogenie.exe\"" mobogenie.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exemobogenie.exedescription pid process target process PID 2292 set thread context of 3908 2292 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe PID 4248 set thread context of 4660 4248 mobogenie.exe mobogenie.exe -
Drops file in Windows directory 2 IoCs
Processes:
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exedescription ioc process File created \??\c:\windows\mobogenie.exe e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe File opened for modification \??\c:\windows\mobogenie.exe e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exemobogenie.exepid process 2292 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe 2292 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe 4248 mobogenie.exe 4248 mobogenie.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exee4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exemobogenie.exedescription pid process target process PID 2292 wrote to memory of 3908 2292 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe PID 2292 wrote to memory of 3908 2292 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe PID 2292 wrote to memory of 3908 2292 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe PID 3908 wrote to memory of 4248 3908 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe mobogenie.exe PID 3908 wrote to memory of 4248 3908 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe mobogenie.exe PID 3908 wrote to memory of 4248 3908 e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe mobogenie.exe PID 4248 wrote to memory of 4660 4248 mobogenie.exe mobogenie.exe PID 4248 wrote to memory of 4660 4248 mobogenie.exe mobogenie.exe PID 4248 wrote to memory of 4660 4248 mobogenie.exe mobogenie.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe"C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe"C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\windows\mobogenie.exe"C:\windows\mobogenie.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\windows\mobogenie.exe"C:\windows\mobogenie.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4660
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD59d2caebe539c08a5809d04a1b4a17700
SHA1625ef938725d9a70b45a47273ed7cde84cef4ea5
SHA256e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f
SHA5121151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97
-
Filesize
147KB
MD59d2caebe539c08a5809d04a1b4a17700
SHA1625ef938725d9a70b45a47273ed7cde84cef4ea5
SHA256e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f
SHA5121151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97
-
Filesize
147KB
MD59d2caebe539c08a5809d04a1b4a17700
SHA1625ef938725d9a70b45a47273ed7cde84cef4ea5
SHA256e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f
SHA5121151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97