Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 01:41
Behavioral task
behavioral1
Sample
471fa1b436cf3eb3240350c658c6ee30.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
471fa1b436cf3eb3240350c658c6ee30.exe
Resource
win10v2004-20240611-en
General
-
Target
471fa1b436cf3eb3240350c658c6ee30.exe
-
Size
134KB
-
MD5
471fa1b436cf3eb3240350c658c6ee30
-
SHA1
1a6150f14cc5e5e7878e9ba8db353a699bc21199
-
SHA256
04d9aa941b5fcf9a06676ac33f2733fb29229bc6670eacc7b1e22c67268ce676
-
SHA512
bcb444637b458a8389d5161ff72e564ca7da5d47df1d85a1deb7495d52f4374fb903168cdfc3c31f85c8e34d260c9c4cfa3953e6394e7ed247b0483b48ebfb39
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qf:riAyLN9aa+9U2rW1ip6pr2At7NZuQf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1752 471fa1b436cf3eb3240350c658c6ee30.exe -
resource yara_rule behavioral1/memory/1752-1-0x0000000000E50000-0x0000000000E78000-memory.dmp upx behavioral1/files/0x000900000001459f-2.dat upx behavioral1/memory/1752-4-0x00000000000F0000-0x0000000000118000-memory.dmp upx behavioral1/memory/2052-7-0x0000000000AA0000-0x0000000000AC8000-memory.dmp upx behavioral1/memory/1752-8-0x0000000000E50000-0x0000000000E78000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 471fa1b436cf3eb3240350c658c6ee30.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2052 1752 471fa1b436cf3eb3240350c658c6ee30.exe 28 PID 1752 wrote to memory of 2052 1752 471fa1b436cf3eb3240350c658c6ee30.exe 28 PID 1752 wrote to memory of 2052 1752 471fa1b436cf3eb3240350c658c6ee30.exe 28 PID 1752 wrote to memory of 2052 1752 471fa1b436cf3eb3240350c658c6ee30.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\471fa1b436cf3eb3240350c658c6ee30.exe"C:\Users\Admin\AppData\Local\Temp\471fa1b436cf3eb3240350c658c6ee30.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD57180ade1cec8ca4e99e963b474d86eac
SHA134b35299dd3b41f23ed379ca973de0ed225cbfa1
SHA256a08ac842a89db8dac3e64150dec631c85b21f48aabbbab69301cfa8063c0b47e
SHA5123100c62766548867900432948900b5518d057cc39927b9b2346c444c849adea7eeaab9dc16c53874a605f1332eb0bf8fca15f3d25f125652690ef6d677666c4e