Analysis

  • max time kernel
    141s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 03:42

General

  • Target

    d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe

  • Size

    134KB

  • MD5

    60d9fc3fb9d2ac819cc3e36a5ae04cde

  • SHA1

    cd7e56f522d330ac7f1b9c496603a6bbb6a496a6

  • SHA256

    d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8

  • SHA512

    fdfb75532fb39f365d0c7b7a3b145281c05f9ad3e5620f6f9d007b91147ac3134c4448c4dd0d71ce20f4fd2687d86f3a3198743865c86daad53bb3c6b61218a6

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q9:riAyLN9aa+9U2rW1ip6pr2At7NZuQ9

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 4 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe
    "C:\Users\Admin\AppData\Local\Temp\d84e39bdd2ca6e402496eb63e7a07b8cc2b2424ac62794f616d1e284a13814f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    35b688095db7f02d6d8cbe65800b6685

    SHA1

    dbb615021c907ea932fc7682d78a1cd546d19d83

    SHA256

    a7645a95f7f1fe02a36006db9d195649e2c7ac2d2bf330e52a5c4fb0bf95e06a

    SHA512

    e94e3cf2658e4dce0a48f743247737b5e96567b33ff8046b62e519caedb7b00252efac3a01a1eb6092f0fff46da3458abae517ab40099253d6227294bcb4f20e

  • memory/2160-0-0x0000000000FE0000-0x0000000001008000-memory.dmp

    Filesize

    160KB

  • memory/2160-5-0x0000000000FE0000-0x0000000001008000-memory.dmp

    Filesize

    160KB

  • memory/2996-6-0x0000000000580000-0x00000000005A8000-memory.dmp

    Filesize

    160KB