Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 20:48
Behavioral task
behavioral1
Sample
38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe
Resource
win10v2004-20240226-en
General
-
Target
38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe
-
Size
134KB
-
MD5
5d55c7e988f21a6b79ea974cd3bc6ee4
-
SHA1
a6e1e7981e5ed09a9d3c144a42a1d1525b872bf1
-
SHA256
38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62
-
SHA512
c1974b6e4d21b76128f8e1d09c9a7eb8fc7e371d09debac4ce8ffadec1b1ce7939067ab6360945efec60fa4d3d643f7e2c9d4509d1daab1330f1e0666a135884
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QL:riAyLN9aa+9U2rW1ip6pr2At7NZuQL
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2028-0-0x0000000000830000-0x0000000000858000-memory.dmp UPX behavioral1/files/0x0038000000013362-2.dat UPX behavioral1/memory/2212-7-0x00000000009F0000-0x0000000000A18000-memory.dmp UPX behavioral1/memory/2028-8-0x0000000000830000-0x0000000000858000-memory.dmp UPX behavioral1/memory/2028-10-0x0000000000830000-0x0000000000858000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2212 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe -
resource yara_rule behavioral1/memory/2028-0-0x0000000000830000-0x0000000000858000-memory.dmp upx behavioral1/files/0x0038000000013362-2.dat upx behavioral1/memory/2212-7-0x00000000009F0000-0x0000000000A18000-memory.dmp upx behavioral1/memory/2028-8-0x0000000000830000-0x0000000000858000-memory.dmp upx behavioral1/memory/2028-10-0x0000000000830000-0x0000000000858000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2212 2028 38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe 28 PID 2028 wrote to memory of 2212 2028 38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe 28 PID 2028 wrote to memory of 2212 2028 38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe 28 PID 2028 wrote to memory of 2212 2028 38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe"C:\Users\Admin\AppData\Local\Temp\38fc5110202d992817d1cc690c30409551c7a32171537232e2ba74f89587fb62.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5661c7e4716942477e05b4d6ccebe0928
SHA160de7ba7d1d789a6fd3e9ee36a8ecb92683ceb51
SHA2569b56b4a1d74a22a0ffca6e40eb51d3cac10a4e51654ad9d0bc03d3573b10f0e1
SHA51268bfd217b0cf937fb524aa0c0d6834125fb3320f8d76867f0f20e4cd33c318caeb35da055146657551facfa49730cdffd54fbe12ddb95d3489858ede0a7fc8fe