Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 17:06
Behavioral task
behavioral1
Sample
ee544447782df17752ef6960f4b8ab50N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ee544447782df17752ef6960f4b8ab50N.exe
Resource
win10v2004-20240709-en
General
-
Target
ee544447782df17752ef6960f4b8ab50N.exe
-
Size
134KB
-
MD5
ee544447782df17752ef6960f4b8ab50
-
SHA1
b7ea6e4a6e408b50381b03b73520d3a3acc8bd61
-
SHA256
ac4e064a830b16e10e0745eea266a1bc731cbb27efe91aa90254458bcffb750e
-
SHA512
fa53564fc40c417f8477178b678484a6ef7e79ada71a00e66bdb7dcba586d40e294eca527f4583c24da1c5031c89fb16c252fb667f01eb1e4dc8a31c8e9f22ac
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qn:riAyLN9aa+9U2rW1ip6pr2At7NZuQn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 ee544447782df17752ef6960f4b8ab50N.exe -
resource yara_rule behavioral1/memory/1904-0-0x0000000001370000-0x0000000001398000-memory.dmp upx behavioral1/files/0x0008000000016d45-2.dat upx behavioral1/memory/2348-7-0x0000000001080000-0x00000000010A8000-memory.dmp upx behavioral1/memory/1904-8-0x0000000001370000-0x0000000001398000-memory.dmp upx behavioral1/memory/2348-10-0x0000000001080000-0x00000000010A8000-memory.dmp upx behavioral1/memory/1904-11-0x0000000001370000-0x0000000001398000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" ee544447782df17752ef6960f4b8ab50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2348 1904 ee544447782df17752ef6960f4b8ab50N.exe 31 PID 1904 wrote to memory of 2348 1904 ee544447782df17752ef6960f4b8ab50N.exe 31 PID 1904 wrote to memory of 2348 1904 ee544447782df17752ef6960f4b8ab50N.exe 31 PID 1904 wrote to memory of 2348 1904 ee544447782df17752ef6960f4b8ab50N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee544447782df17752ef6960f4b8ab50N.exe"C:\Users\Admin\AppData\Local\Temp\ee544447782df17752ef6960f4b8ab50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56950905159300311688922ba61942c4b
SHA1ec58aaf3f61d5f3b276dfa5743d13ec9c7df2cc5
SHA25672a2d7977849d5b191f4e903fab2eb065da8396677214b443ae962455ced77e4
SHA512d3206bfbdc483a33b479900837909e96ed5b7cc61bbdfa09e7f74937607b329936c41eb70fae29cfb908f589735125550435b3727891214adbbb660e0b852e33