Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 12:05
Behavioral task
behavioral1
Sample
0063fa8bd3a953ef71a48bf1aa0ccef0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0063fa8bd3a953ef71a48bf1aa0ccef0N.exe
Resource
win10v2004-20240709-en
General
-
Target
0063fa8bd3a953ef71a48bf1aa0ccef0N.exe
-
Size
134KB
-
MD5
0063fa8bd3a953ef71a48bf1aa0ccef0
-
SHA1
34683b9259ec0c1fd3d0d25da255fd2207b7ecd1
-
SHA256
1f7de0632f715a1ef039955e5aab2e32f2a4665fedaf8e2e552f6d6c0dfd4221
-
SHA512
65c605a83de8f516ccfa13e7df0658a8f4c098bf525738d2899f97e8f9a03e0cd23d2a9487affcaf2695238b92a28082b808a962a0f100ec2177f4bc75eb8842
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QB:riAyLN9aa+9U2rW1ip6pr2At7NZuQB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 896 WwanSvc.exe -
resource yara_rule behavioral2/memory/3680-0-0x0000000000310000-0x0000000000338000-memory.dmp upx behavioral2/files/0x00080000000234a4-5.dat upx behavioral2/memory/3680-4-0x0000000000310000-0x0000000000338000-memory.dmp upx behavioral2/memory/896-6-0x0000000000F90000-0x0000000000FB8000-memory.dmp upx behavioral2/memory/896-7-0x0000000000F90000-0x0000000000FB8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 0063fa8bd3a953ef71a48bf1aa0ccef0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 896 3680 0063fa8bd3a953ef71a48bf1aa0ccef0N.exe 83 PID 3680 wrote to memory of 896 3680 0063fa8bd3a953ef71a48bf1aa0ccef0N.exe 83 PID 3680 wrote to memory of 896 3680 0063fa8bd3a953ef71a48bf1aa0ccef0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0063fa8bd3a953ef71a48bf1aa0ccef0N.exe"C:\Users\Admin\AppData\Local\Temp\0063fa8bd3a953ef71a48bf1aa0ccef0N.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD593b29d33e887e0dc0df6288f38792fe0
SHA118e099baa557742550ae74e5ce04e352297b091e
SHA2565d8d598e2aab299d657d0eea0bc5af700ebb8c96826a6c050a34add904fc9214
SHA512e0bce460117a83a4a772b52000222b35c1ffdd1e4e3839e295e77460abb0e9c31796ffc264eb30fd59f71e6ccb261fd9ffe501f55b2b04729868cbc747992585