Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 17:06

General

  • Target

    ee544447782df17752ef6960f4b8ab50N.exe

  • Size

    134KB

  • MD5

    ee544447782df17752ef6960f4b8ab50

  • SHA1

    b7ea6e4a6e408b50381b03b73520d3a3acc8bd61

  • SHA256

    ac4e064a830b16e10e0745eea266a1bc731cbb27efe91aa90254458bcffb750e

  • SHA512

    fa53564fc40c417f8477178b678484a6ef7e79ada71a00e66bdb7dcba586d40e294eca527f4583c24da1c5031c89fb16c252fb667f01eb1e4dc8a31c8e9f22ac

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qn:riAyLN9aa+9U2rW1ip6pr2At7NZuQn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee544447782df17752ef6960f4b8ab50N.exe
    "C:\Users\Admin\AppData\Local\Temp\ee544447782df17752ef6960f4b8ab50N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    6950905159300311688922ba61942c4b

    SHA1

    ec58aaf3f61d5f3b276dfa5743d13ec9c7df2cc5

    SHA256

    72a2d7977849d5b191f4e903fab2eb065da8396677214b443ae962455ced77e4

    SHA512

    d3206bfbdc483a33b479900837909e96ed5b7cc61bbdfa09e7f74937607b329936c41eb70fae29cfb908f589735125550435b3727891214adbbb660e0b852e33

  • memory/1904-0-0x0000000001370000-0x0000000001398000-memory.dmp

    Filesize

    160KB

  • memory/1904-6-0x0000000001080000-0x00000000010A8000-memory.dmp

    Filesize

    160KB

  • memory/1904-8-0x0000000001370000-0x0000000001398000-memory.dmp

    Filesize

    160KB

  • memory/1904-9-0x0000000001080000-0x00000000010A8000-memory.dmp

    Filesize

    160KB

  • memory/1904-11-0x0000000001370000-0x0000000001398000-memory.dmp

    Filesize

    160KB

  • memory/2348-7-0x0000000001080000-0x00000000010A8000-memory.dmp

    Filesize

    160KB

  • memory/2348-10-0x0000000001080000-0x00000000010A8000-memory.dmp

    Filesize

    160KB