Analysis

  • max time kernel
    148s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:38

General

  • Target

    e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe

  • Size

    147KB

  • MD5

    9d2caebe539c08a5809d04a1b4a17700

  • SHA1

    625ef938725d9a70b45a47273ed7cde84cef4ea5

  • SHA256

    e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f

  • SHA512

    1151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97

  • SSDEEP

    3072:jdWfG6HPtQ+4VbLqXd79pqp1j1JAlYaeUbcA+Mx/i8pjHUafB:j96HPtQ+4Vbmdxgj7VaeUJ7xhHUaZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe
    "C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe
      "C:\Users\Admin\AppData\Local\Temp\e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\windows\mobogenie.exe
        "C:\windows\mobogenie.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\windows\mobogenie.exe
          "C:\windows\mobogenie.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:4660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mobogenie.exe

    Filesize

    147KB

    MD5

    9d2caebe539c08a5809d04a1b4a17700

    SHA1

    625ef938725d9a70b45a47273ed7cde84cef4ea5

    SHA256

    e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f

    SHA512

    1151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97

  • C:\Windows\mobogenie.exe

    Filesize

    147KB

    MD5

    9d2caebe539c08a5809d04a1b4a17700

    SHA1

    625ef938725d9a70b45a47273ed7cde84cef4ea5

    SHA256

    e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f

    SHA512

    1151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97

  • C:\windows\mobogenie.exe

    Filesize

    147KB

    MD5

    9d2caebe539c08a5809d04a1b4a17700

    SHA1

    625ef938725d9a70b45a47273ed7cde84cef4ea5

    SHA256

    e4dfcf3db512260e1a4ff414907610d5d5279143fa9ade9219d8691be02e512f

    SHA512

    1151c84b2450372f2ffd7c0431e669c529801e23036b0e47eb0bc4ffee3856d2394e2d7a9386d479ee0a96e166f92cad38ca44589c260293382f73b70208de97

  • memory/3908-132-0x0000000000000000-mapping.dmp

  • memory/3908-133-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3908-137-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4248-134-0x0000000000000000-mapping.dmp

  • memory/4660-138-0x0000000000000000-mapping.dmp

  • memory/4660-140-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB