Analysis
-
max time kernel
23s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe
Resource
win10v2004-20240802-en
General
-
Target
b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe
-
Size
208KB
-
MD5
2a1a7ff58ed0fb57f9b68c91901a7150
-
SHA1
c154025318f72a5d1f54f1633f627e55419f9f35
-
SHA256
b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58
-
SHA512
0e93b2ff5bbed5648c6153dd980a60701be6be7786a79f61cca5d8b03e0afb2adf98141c606dc19784ef5226ecb29363bd2ef2fc80a5f8ed89ffef6f8a94f772
-
SSDEEP
6144:d6WI6x1UYmwyukOslxQYcOgNgAAgczkRtz7/hQEjE:dPuBgNgAAgczkRtH/hQn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 MOBWAGZ.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\MOBWAGZ.exe b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe File opened for modification C:\windows\MOBWAGZ.exe b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe File created C:\windows\MOBWAGZ.exe.bat b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MOBWAGZ.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 2584 MOBWAGZ.exe 2584 MOBWAGZ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 2584 MOBWAGZ.exe 2584 MOBWAGZ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2828 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 30 PID 2716 wrote to memory of 2828 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 30 PID 2716 wrote to memory of 2828 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 30 PID 2716 wrote to memory of 2828 2716 b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe 30 PID 2828 wrote to memory of 2584 2828 cmd.exe 32 PID 2828 wrote to memory of 2584 2828 cmd.exe 32 PID 2828 wrote to memory of 2584 2828 cmd.exe 32 PID 2828 wrote to memory of 2584 2828 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe"C:\Users\Admin\AppData\Local\Temp\b4adb5a5c4d12719a397d5c2df3dfd344ca02627c2ccf16f2f207f0dfc09dd58N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\MOBWAGZ.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\windows\MOBWAGZ.exeC:\windows\MOBWAGZ.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD56306faddee10a3a3a4e762be6e440ae7
SHA1270d1d323ccd14b38ebb34fa58a987224840c003
SHA256aea810b9af39103dd13a3f45b7177e6284e6a5e9cfffbf4616a7e3c60939b9d7
SHA5123e61da69a5aec035e0dd9fac85ca55330782ad7715f52a50032fe9aae51502fa18a0606c4942a94af4b505f9842f27008c521ba4bfc6aff86c20de0a534cbb1a
-
Filesize
208KB
MD59e85ba57237792c6d4b7a54873e2584f
SHA14bb6d55833b3c8f026d914073ee1c22a97f4bbbd
SHA256de2bdbfc8d1f83a196d6738e532728e0e334614e0069ac5435b0155125cb8ea4
SHA512e6e667df6e539158c4af0969735c70b4f8125784335e9d42284d71dedd311653bd7630017aeb4dab76a5861418c3be197e679512510987da1122bc13f23f6189