Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 21:19

General

  • Target

    49568e72a146f2fc7935afe68b749bbcd6583004174703dbfe2d1b2cb9938f0c.exe

  • Size

    134KB

  • MD5

    61b00f4a4ff120a45d908c4679c15031

  • SHA1

    8b23c7e177a518e9f19ae059068e080b73741b7a

  • SHA256

    49568e72a146f2fc7935afe68b749bbcd6583004174703dbfe2d1b2cb9938f0c

  • SHA512

    a2d0d7a636421eabc04e3c00f54dd945311885552e8ff457202445cdb09008f18f26e54ed8881bf90e734ec2986614ccd362072e757c1a21ec762f39c85345de

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QP:riAyLN9aa+9U2rW1ip6pr2At7NZuQP

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49568e72a146f2fc7935afe68b749bbcd6583004174703dbfe2d1b2cb9938f0c.exe
    "C:\Users\Admin\AppData\Local\Temp\49568e72a146f2fc7935afe68b749bbcd6583004174703dbfe2d1b2cb9938f0c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    f876c87b0ffcb27635fb75c021e55b45

    SHA1

    4646cd39bb6feb4469b91cbd397188120e053e0a

    SHA256

    09d11ed035bd8ab95c51d356e6ed99b9aad4fe7e0133052dd30e79020c49a732

    SHA512

    01d27eb02e76a8c11db07d9e31ce7e7f8937b247bb5c704b881bb2b916abae5cd0d6d3d4eb080c08ffd063676270419d87c21b9b6178bcea0be62aad11270b58

  • memory/1656-6-0x0000000000CB0000-0x0000000000CD8000-memory.dmp

    Filesize

    160KB

  • memory/3068-0-0x0000000000F80000-0x0000000000FA8000-memory.dmp

    Filesize

    160KB

  • memory/3068-7-0x0000000000F80000-0x0000000000FA8000-memory.dmp

    Filesize

    160KB

  • memory/3068-8-0x0000000000CB0000-0x0000000000CD8000-memory.dmp

    Filesize

    160KB

  • memory/3068-9-0x0000000000F80000-0x0000000000FA8000-memory.dmp

    Filesize

    160KB