Analysis
-
max time kernel
141s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 03:42
Behavioral task
behavioral1
Sample
d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe
Resource
win10v2004-20240508-en
General
-
Target
d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe
-
Size
134KB
-
MD5
60d9fc3fb9d2ac819cc3e36a5ae04cde
-
SHA1
cd7e56f522d330ac7f1b9c496603a6bbb6a496a6
-
SHA256
d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8
-
SHA512
fdfb75532fb39f365d0c7b7a3b145281c05f9ad3e5620f6f9d007b91147ac3134c4448c4dd0d71ce20f4fd2687d86f3a3198743865c86daad53bb3c6b61218a6
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q9:riAyLN9aa+9U2rW1ip6pr2At7NZuQ9
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/2160-0-0x0000000000FE0000-0x0000000001008000-memory.dmp UPX behavioral2/files/0x000a0000000233e5-3.dat UPX behavioral2/memory/2160-5-0x0000000000FE0000-0x0000000001008000-memory.dmp UPX behavioral2/memory/2996-6-0x0000000000580000-0x00000000005A8000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2996 WwanSvc.exe -
resource yara_rule behavioral2/memory/2160-0-0x0000000000FE0000-0x0000000001008000-memory.dmp upx behavioral2/files/0x000a0000000233e5-3.dat upx behavioral2/memory/2160-5-0x0000000000FE0000-0x0000000001008000-memory.dmp upx behavioral2/memory/2996-6-0x0000000000580000-0x00000000005A8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2996 2160 d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe 82 PID 2160 wrote to memory of 2996 2160 d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe 82 PID 2160 wrote to memory of 2996 2160 d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe"C:\Users\Admin\AppData\Local\Temp\d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD535b688095db7f02d6d8cbe65800b6685
SHA1dbb615021c907ea932fc7682d78a1cd546d19d83
SHA256a7645a95f7f1fe02a36006db9d195649e2c7ac2d2bf330e52a5c4fb0bf95e06a
SHA512e94e3cf2658e4dce0a48f743247737b5e96567b33ff8046b62e519caedb7b00252efac3a01a1eb6092f0fff46da3458abae517ab40099253d6227294bcb4f20e