File name:

mb-support.exe

Full analysis: https://app.any.run/tasks/0a45b8d2-4a47-48de-b33d-93c6454aacff
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 22, 2024, 09:39:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
floxif
upx
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8B35B5557ED9D4590A09DCDB62D5E176

SHA1:

911D139C2CB2596B0A1F24A9C4DC3B1D1FE07274

SHA256:

20568D10B096ECC723142018C1927D7BD9E5E489454910F746F2C3B48F732BA9

SSDEEP:

98304:8hUhnNneJkuX4IukycGuahjoGtEpRw9HKEhn0RD6O1JoRzs9Z5PMGxt7ahKzN0Xu:8uT0dS7kJVzKJChu+6mluDwk4v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • FLOXIF has been detected (SURICATA)

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • mb-support.exe (PID: 6604)
    • Drops 7-zip archiver for unpacking

      • mb-support.exe (PID: 6604)
    • Drops the executable file immediately after the start

      • mb-support.exe (PID: 6604)
    • Executable content was dropped or overwritten

      • mb-support.exe (PID: 6604)
    • Process drops legitimate windows executable

      • mb-support.exe (PID: 6604)
    • Contacting a server suspected of hosting an CnC

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • Reads security settings of Internet Explorer

      • mb-support.exe (PID: 6724)
    • Checks Windows Trust Settings

      • mb-support.exe (PID: 6724)
    • Adds/modifies Windows certificates

      • mb-support.exe (PID: 6724)
  • INFO

    • Creates files in the program directory

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • UPX packer has been detected

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • Create files in a temporary directory

      • mb-support.exe (PID: 6724)
    • Reads the computer name

      • mb-support.exe (PID: 6724)
    • Reads the machine GUID from the registry

      • mb-support.exe (PID: 6724)
    • Reads Environment values

      • mb-support.exe (PID: 6724)
    • Checks supported languages

      • mb-support.exe (PID: 6724)
    • Reads the software policy settings

      • mb-support.exe (PID: 6724)
    • Checks proxy server information

      • mb-support.exe (PID: 6724)
    • Creates files or folders in the user directory

      • mb-support.exe (PID: 6724)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:18 16:27:35+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104960
InitializedDataSize: 607744
UninitializedDataSize: -
EntryPoint: 0x14b04
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.9.10.1005
ProductVersionNumber: 1.9.10.1005
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Malwarebytes Support Tool
FileVersion: 1.9.10.1005
LegalCopyright: Copyright (c) 2017, Malwarebytes
OriginalFileName: mb-support.exe
ProductName: Malwarebytes Support Tool
ProductVersion: 1.9.10.1005
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #FLOXIF mb-support.exe #FLOXIF mb-support.exe mb-support.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4020"C:\Users\admin\Desktop\mb-support.exe" C:\Users\admin\Desktop\mb-support.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Malwarebytes Support Tool
Exit code:
3221226540
Version:
1.9.10.1005
Modules
Images
c:\users\admin\desktop\mb-support.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6604"C:\Users\admin\Desktop\mb-support.exe" C:\Users\admin\Desktop\mb-support.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Malwarebytes Support Tool
Exit code:
0
Version:
1.9.10.1005
6724C:\Users\admin\AppData\Local\Temp\mwb4FAA.tmp\mb-support.exe C:\Users\admin\AppData\Local\Temp\mwb4FAA.tmp\mb-support.exe
mbstub.exe
User:
admin
Company:
Malwarebytes Corporation
Integrity Level:
HIGH
Description:
mb-support
Version:
1.9.10.1005
Modules
Images
c:\users\admin\appdata\local\temp\mwb4faa.tmp\mb-support.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
7 427
Read events
7 404
Write events
17
Delete events
6

Modification events

(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates
Operation:delete valueName:F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
Value:
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
Operation:writeName:Blob
Value:
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
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
Operation:writeName:Blob
Value:
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
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Value:
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Operation:writeName:Blob
Value:
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
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Operation:writeName:Blob
Value:
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
Executable files
75
Suspicious files
9
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6604mb-support.exeC:\Program Files\Common Files\System\symsrv.dllexecutable
MD5:7574CF2C64F35161AB1292E2F532AABF
SHA256:DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\ERDNTWIN.LOCtext
MD5:388D865D44EE8069DF8BD12EFEDADB3E
SHA256:9BDFEFD45997B94CFE323D4CE4209941A08061EA364BB969A9D3AFB418B6FE61
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\A1D26E2\FC6E1A0819CC.tmpexecutable
MD5:0060D642D5072EC9BB1C8A4095E6ABB4
SHA256:EF227C2A88CCF04AB9D3792C63BBC392008161037DE212CF89C5F1CB0CF9EFA8
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\ERDNTDOS.LOCbinary
MD5:F9650A5C954D2A9F8844DE99E8577F93
SHA256:3C3BA112731C697B8700DE546195C4A02F96F4FE28D39A75551F932985E0C15E
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\mb-support.exe.configxml
MD5:13EA16D9D53C5BDAE98DD95500DCE016
SHA256:31E4268DB7CBFC6F6F833C75332B8F5BE74CA61872AC94FD4CE612567290AF5E
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\mbstub.ipdbbinary
MD5:2C7505E18BEF0543ED5A594AFE292A92
SHA256:CAE2B7B5FBA1CF2F857E7F5F8396A4A39F8B1467A1941003DD539C05880946BB
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:72F8626388893A536D0EE370ACC9E456
SHA256:5C9D7085295DAE9A9B2D3A9C66D99D0061D0BA14F218B95E95E8B01BB7204C87
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:50FEE042CEE2A4AABA502D2F5087AE70
SHA256:656D1B11A6242142B9B289445FBE7617AD9B5F6FCF47AD6983FF09194C867BBC
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:045E4617B49E817007D8A88652AF7734
SHA256:FD387D4E358E3755DB38A618066FB72CD03B17B54D058DBE3DAB82065519EDC7
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:A960E117840ACB5FF1D2DCFBBE574E21
SHA256:5695695176A80A3E7F9EAC80BB3D92DF1A5592BE42B939B14087A3A6AE6EFADF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
36
DNS requests
24
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
GET
302
192.0.66.233:443
https://ark.mwbsys.com/mbst/latest?semver=1.9.10
unknown
GET
302
192.0.66.233:443
https://ark.mwbsys.com/mbst/latest?semver=1.9.10
unknown
GET
302
192.0.66.233:443
https://ark.mwbsys.com/mbst/latest
unknown
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
GET
99.86.4.118:443
https://cdn.mwbsys.com/packages/mbst.app/d/e/1/4/de14da361ce2cb6402cdb86482b3e0a1/c3d64a69-3c5a-4e8b-8921-8ff8934fca95.exe
unknown
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
45.33.18.44:80
www.aieov.com
Linode, LLC
US
unknown
3.231.51.70:443
ark.mwbsys.com
AMAZON-AES
US
unknown
3412
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6156
mbstub.exe
3.231.51.70:443
ark.mwbsys.com
AMAZON-AES
US
unknown
6604
mb-support.exe
45.33.18.44:80
www.aieov.com
Linode, LLC
US
unknown
6156
mbstub.exe
99.86.4.25:443
cdn.mwbsys.com
AMAZON-02
US
unknown
6156
mbstub.exe
18.245.46.19:443
mbst.mwbsys.com
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.78
whitelisted
5isohu.com
whitelisted
www.aieov.com
  • 45.33.18.44
  • 45.33.30.197
  • 72.14.178.174
  • 45.33.20.235
  • 45.56.79.23
  • 198.58.118.167
  • 45.33.23.183
  • 96.126.123.244
  • 45.79.19.196
  • 45.33.2.79
  • 173.255.194.134
  • 72.14.185.43
unknown
ark.mwbsys.com
  • 44.210.170.131
  • 34.194.130.27
  • 3.231.51.70
whitelisted
cdn.mwbsys.com
  • 99.86.4.35
  • 99.86.4.25
  • 99.86.4.72
  • 99.86.4.118
whitelisted
mbst.mwbsys.com
  • 18.245.46.35
  • 18.245.46.36
  • 18.245.46.120
  • 18.245.46.19
whitelisted
downloads.malwarebytes.com
  • 52.222.214.43
  • 52.222.214.90
  • 52.222.214.121
  • 52.222.214.71
whitelisted
download.bleepingcomputer.com
  • 104.20.185.56
  • 104.20.184.56
  • 172.67.2.229
whitelisted
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted

Threats

Found threats are available for the paid subscriptions
12 ETPRO signatures available at the full report
Process
Message
mb-support.exe
Application_Startup
mb-support.exe
Starting TaskReadLogFile thread