Overview
overview
6Static
static
6mobikin-er...id.exe
windows7-x64
4mobikin-er...id.exe
windows10-2004-x64
4Driver/goo...er.zip
windows7-x64
1Driver/goo...er.zip
windows10-2004-x64
1I18n/de_DE/strings.mo
windows7-x64
3I18n/de_DE/strings.mo
windows10-2004-x64
3I18n/en_US/strings.mo
windows7-x64
3I18n/en_US/strings.mo
windows10-2004-x64
3I18n/es_ES/strings.mo
windows7-x64
3I18n/es_ES/strings.mo
windows10-2004-x64
3I18n/fr_FR/strings.mo
windows7-x64
3I18n/fr_FR/strings.mo
windows10-2004-x64
3I18n/it_IT/strings.mo
windows7-x64
3I18n/it_IT/strings.mo
windows10-2004-x64
3I18n/ja_JP/strings.mo
windows7-x64
3I18n/ja_JP/strings.mo
windows10-2004-x64
3I18n/pt_PT/strings.mo
windows7-x64
3I18n/pt_PT/strings.mo
windows10-2004-x64
3I18n/zh_CN/strings.mo
windows7-x64
3I18n/zh_CN/strings.mo
windows10-2004-x64
I18n/zh_TW/strings.mo
windows7-x64
3I18n/zh_TW/strings.mo
windows10-2004-x64
3License/li...br.txt
windows7-x64
1License/li...br.txt
windows10-2004-x64
1License/li...cn.txt
windows7-x64
1License/li...cn.txt
windows10-2004-x64
1License/li...de.txt
windows7-x64
1License/li...de.txt
windows10-2004-x64
1License/li...es.txt
windows7-x64
1License/li...es.txt
windows10-2004-x64
1License/li...fr.txt
windows7-x64
1License/li...fr.txt
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
mobikin-eraser-for-android.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
mobikin-eraser-for-android.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Driver/google_usb_driver.zip
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Driver/google_usb_driver.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
I18n/de_DE/strings.mo
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
I18n/de_DE/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
I18n/en_US/strings.mo
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
I18n/en_US/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
I18n/es_ES/strings.mo
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
I18n/es_ES/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
I18n/fr_FR/strings.mo
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
I18n/fr_FR/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
I18n/it_IT/strings.mo
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
I18n/it_IT/strings.mo
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
I18n/ja_JP/strings.mo
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
I18n/ja_JP/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
I18n/pt_PT/strings.mo
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
I18n/pt_PT/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
I18n/zh_CN/strings.mo
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
I18n/zh_CN/strings.mo
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
I18n/zh_TW/strings.mo
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
I18n/zh_TW/strings.mo
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
License/license_br.txt
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
License/license_br.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
License/license_cn.txt
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
License/license_cn.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
License/license_de.txt
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
License/license_de.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
License/license_es.txt
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
License/license_es.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
License/license_fr.txt
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
License/license_fr.txt
Resource
win10v2004-20240412-en
General
-
Target
I18n/zh_CN/strings.mo
-
Size
25KB
-
MD5
2fba4b79937ba3c9e94e3955059798a0
-
SHA1
91e513ff8c9ecd6d1bfdab7659a549015b64a0c4
-
SHA256
2bc340a210f642737833bf22c67db1c55d86949758354111db055e0a7ca8ab18
-
SHA512
5e905ae5f1384d7f1d48b5789ededc5f9d219388b5b50a0d47cf34afee489fd817990de08f81fc67ddee3fe72b00170d2b92c3affd525420e7d4a77b6b97c89b
-
SSDEEP
768:bJtjDOl0j0Foxuh6e3308cwEIyrYdde2zVD1th4fjGkC:rae3uh6e337xKji
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\mo_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\mo_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\mo_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.mo rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.mo\ = "mo_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\mo_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\mo_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\mo_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2452 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2452 AcroRd32.exe 2452 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2652 2864 cmd.exe 29 PID 2864 wrote to memory of 2652 2864 cmd.exe 29 PID 2864 wrote to memory of 2652 2864 cmd.exe 29 PID 2652 wrote to memory of 2452 2652 rundll32.exe 30 PID 2652 wrote to memory of 2452 2652 rundll32.exe 30 PID 2652 wrote to memory of 2452 2652 rundll32.exe 30 PID 2652 wrote to memory of 2452 2652 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\I18n\zh_CN\strings.mo1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\I18n\zh_CN\strings.mo2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\I18n\zh_CN\strings.mo"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5859e4d73a0a1212654e77a84f3d6016b
SHA1cecb64d48f1c03b49239e219217990daa8764d77
SHA256a5b1d9dd0308910bb95e8d171394887a79e26eb801f134779529de8128d1ce17
SHA512cd1cb97d164fae677b1d510f01a854e4157928abf09a33d71c576ca4f30b2b0eb2dabe27c197659fa8b889d817c05003b1d3b60ee36f8c6fe1393058bf05659f