Overview
overview
6Static
static
1bin/MobaBox.exe
windows11-21h2-x64
bin/MobaVNC.exe
windows11-21h2-x64
bin/Server...ons.sh
windows11-21h2-x64
3bin/VNCHooks.dll
windows11-21h2-x64
1bin/_ssh.exe
windows11-21h2-x64
bin/_ssh1.exe
windows11-21h2-x64
bin/_vim.exe
windows11-21h2-x64
bin/autossh.exe
windows11-21h2-x64
bin/awk.exe
windows11-21h2-x64
bin/bash.exe
windows11-21h2-x64
bin/conin.exe
windows11-21h2-x64
bin/ctris.exe
windows11-21h2-x64
bin/curl.exe
windows11-21h2-x64
bin/cygcom_err-3.dll
windows11-21h2-x64
1bin/cygcrypto-3.dll
windows11-21h2-x64
1bin/cygcurl-4.dll
windows11-21h2-x64
1bin/cygfido2-1.dll
windows11-21h2-x64
1bin/cyggcc...-1.dll
windows11-21h2-x64
1bin/cyggss...-2.dll
windows11-21h2-x64
1bin/cyggssrpc-4.dll
windows11-21h2-x64
1bin/cygiconv-2.dll
windows11-21h2-x64
1bin/cygk5crypto-3.dll
windows11-21h2-x64
1bin/cygkad...11.dll
windows11-21h2-x64
1bin/cygkdb5-8.dll
windows11-21h2-x64
1bin/cygkrb5-3.dll
windows11-21h2-x64
1bin/cygkrb...-0.dll
windows11-21h2-x64
1bin/cygncu...10.dll
windows11-21h2-x64
1bin/cygopenssh.dll
windows11-21h2-x64
1bin/cygssh2-1.dll
windows11-21h2-x64
1bin/cygssl-3.dll
windows11-21h2-x64
1bin/cygssp-0.dll
windows11-21h2-x64
1MobaXterm_....0.msi
windows11-21h2-x64
6Analysis
-
max time kernel
152s -
max time network
302s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
bin/MobaBox.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
bin/MobaVNC.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
bin/ServersListToMxtSessions.sh
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
bin/VNCHooks.dll
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
bin/_ssh.exe
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
bin/_ssh1.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
bin/_vim.exe
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
bin/autossh.exe
Resource
win11-20240214-en
Behavioral task
behavioral9
Sample
bin/awk.exe
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
bin/bash.exe
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
bin/conin.exe
Resource
win11-20240221-en
Behavioral task
behavioral12
Sample
bin/ctris.exe
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
bin/curl.exe
Resource
win11-20240221-en
Behavioral task
behavioral14
Sample
bin/cygcom_err-3.dll
Resource
win11-20240221-en
Behavioral task
behavioral15
Sample
bin/cygcrypto-3.dll
Resource
win11-20240221-en
Behavioral task
behavioral16
Sample
bin/cygcurl-4.dll
Resource
win11-20240319-en
Behavioral task
behavioral17
Sample
bin/cygfido2-1.dll
Resource
win11-20240221-en
Behavioral task
behavioral18
Sample
bin/cyggcc_s-seh-1.dll
Resource
win11-20240221-en
Behavioral task
behavioral19
Sample
bin/cyggssapi_krb5-2.dll
Resource
win11-20240221-en
Behavioral task
behavioral20
Sample
bin/cyggssrpc-4.dll
Resource
win11-20240221-en
Behavioral task
behavioral21
Sample
bin/cygiconv-2.dll
Resource
win11-20240221-en
Behavioral task
behavioral22
Sample
bin/cygk5crypto-3.dll
Resource
win11-20240221-en
Behavioral task
behavioral23
Sample
bin/cygkadm5srv_mit-11.dll
Resource
win11-20240214-en
Behavioral task
behavioral24
Sample
bin/cygkdb5-8.dll
Resource
win11-20240221-en
Behavioral task
behavioral25
Sample
bin/cygkrb5-3.dll
Resource
win11-20240319-en
Behavioral task
behavioral26
Sample
bin/cygkrb5support-0.dll
Resource
win11-20240221-en
Behavioral task
behavioral27
Sample
bin/cygncursesw-10.dll
Resource
win11-20240221-en
Behavioral task
behavioral28
Sample
bin/cygopenssh.dll
Resource
win11-20240221-en
Behavioral task
behavioral29
Sample
bin/cygssh2-1.dll
Resource
win11-20240221-en
Behavioral task
behavioral30
Sample
bin/cygssl-3.dll
Resource
win11-20240221-en
Behavioral task
behavioral31
Sample
bin/cygssp-0.dll
Resource
win11-20240221-en
Behavioral task
behavioral32
Sample
MobaXterm_installer_24.0.msi
Resource
win11-20240221-en
General
-
Target
MobaXterm_installer_24.0.msi
-
Size
13.2MB
-
MD5
472a864c6648bb01f0cdd44f942e5e62
-
SHA1
47c3b829bf4ada054ee7c7bcbd101edd82de0ce2
-
SHA256
22d4edc469689eb8712333dc5a578733bd8305e28895a91685208945b81bda92
-
SHA512
099ca08e460fc0f5b6798210d509cae1e797c28c401a578f3b259304317d5fbe50dfcec141e976a483c5cf9bddad96bc7012dd0cb67cbbe984b2a55609b4be1b
-
SSDEEP
196608:qJO++NWO+P72Rs9NLyZAvdE8ex+YJ9PX3F9rPxTu+Btcxx5qVYtNIL:YHxOc2Rs9NVdE8xc9/3F9rNoxxYYT8
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 3584 msiexec.exe 4 3584 msiexec.exe 5 3584 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 3584 msiexec.exe Token: SeIncreaseQuotaPrivilege 3584 msiexec.exe Token: SeSecurityPrivilege 832 msiexec.exe Token: SeCreateTokenPrivilege 3584 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3584 msiexec.exe Token: SeLockMemoryPrivilege 3584 msiexec.exe Token: SeIncreaseQuotaPrivilege 3584 msiexec.exe Token: SeMachineAccountPrivilege 3584 msiexec.exe Token: SeTcbPrivilege 3584 msiexec.exe Token: SeSecurityPrivilege 3584 msiexec.exe Token: SeTakeOwnershipPrivilege 3584 msiexec.exe Token: SeLoadDriverPrivilege 3584 msiexec.exe Token: SeSystemProfilePrivilege 3584 msiexec.exe Token: SeSystemtimePrivilege 3584 msiexec.exe Token: SeProfSingleProcessPrivilege 3584 msiexec.exe Token: SeIncBasePriorityPrivilege 3584 msiexec.exe Token: SeCreatePagefilePrivilege 3584 msiexec.exe Token: SeCreatePermanentPrivilege 3584 msiexec.exe Token: SeBackupPrivilege 3584 msiexec.exe Token: SeRestorePrivilege 3584 msiexec.exe Token: SeShutdownPrivilege 3584 msiexec.exe Token: SeDebugPrivilege 3584 msiexec.exe Token: SeAuditPrivilege 3584 msiexec.exe Token: SeSystemEnvironmentPrivilege 3584 msiexec.exe Token: SeChangeNotifyPrivilege 3584 msiexec.exe Token: SeRemoteShutdownPrivilege 3584 msiexec.exe Token: SeUndockPrivilege 3584 msiexec.exe Token: SeSyncAgentPrivilege 3584 msiexec.exe Token: SeEnableDelegationPrivilege 3584 msiexec.exe Token: SeManageVolumePrivilege 3584 msiexec.exe Token: SeImpersonatePrivilege 3584 msiexec.exe Token: SeCreateGlobalPrivilege 3584 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3584 msiexec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MobaXterm_installer_24.0.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3584
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:832