Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 21:35
Behavioral task
behavioral1
Sample
47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe
Resource
win10v2004-20240426-en
General
-
Target
47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe
-
Size
134KB
-
MD5
23698b87276655fe6c240b4cda58c9a3
-
SHA1
878e7f6eedab962811428dc493de353000c949c6
-
SHA256
47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04
-
SHA512
83a485f643431c7ded551578a9d5924759d62b54a17f128024b3b4a5640082e3a1509d5a6972754829a4d17d78fd6f292505191b06ac83ddbf2f048085ef9aa1
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q2:riAyLN9aa+9U2rW1ip6pr2At7NZuQ2
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/1608-1-0x0000000000B50000-0x0000000000B78000-memory.dmp UPX behavioral1/files/0x0038000000016d05-2.dat UPX behavioral1/memory/1608-4-0x0000000000170000-0x0000000000198000-memory.dmp UPX behavioral1/memory/1896-7-0x0000000001290000-0x00000000012B8000-memory.dmp UPX behavioral1/memory/1608-8-0x0000000000B50000-0x0000000000B78000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 1896 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1608 47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe -
resource yara_rule behavioral1/memory/1608-1-0x0000000000B50000-0x0000000000B78000-memory.dmp upx behavioral1/files/0x0038000000016d05-2.dat upx behavioral1/memory/1608-4-0x0000000000170000-0x0000000000198000-memory.dmp upx behavioral1/memory/1896-7-0x0000000001290000-0x00000000012B8000-memory.dmp upx behavioral1/memory/1608-8-0x0000000000B50000-0x0000000000B78000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1896 1608 47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe 28 PID 1608 wrote to memory of 1896 1608 47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe 28 PID 1608 wrote to memory of 1896 1608 47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe 28 PID 1608 wrote to memory of 1896 1608 47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe"C:\Users\Admin\AppData\Local\Temp\47c77c69cd8fbaf270ab41bc96f8da0c2c3c10e22dc02fe78947028df54c6e04.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5c28bf521ec93c37e3278335de3a51891
SHA1734f12695ded815be2805037287195d601776421
SHA2562ff727e931c63a2b631ce8ad6334eb92e5cec21dc1448bf3a2e886ec157214d1
SHA512dc71e1bb13f02ea18a11c0613ecff5df97e4e9a2eb8b7f51ab2a30ca53d8d2b0aa4dac6c68e54583c61e53ab7656a94beb94b297a524c67fc1458911276dc0e7