Analysis
-
max time kernel
119s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 01:07
Behavioral task
behavioral1
Sample
3ad486fd7788db7765ba191096940d50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ad486fd7788db7765ba191096940d50N.exe
Resource
win10v2004-20240709-en
General
-
Target
3ad486fd7788db7765ba191096940d50N.exe
-
Size
134KB
-
MD5
3ad486fd7788db7765ba191096940d50
-
SHA1
c72e600c200221aeb924e9912a8098c786314ecb
-
SHA256
7b9b823f441814129369e2e60b1ee1a5019a198798c702d8c74056d018c0d316
-
SHA512
95c12e6572f4c68b374ae7850021eaa877fc7964a2b79c0faeaa28c2c4fd5baf9373dda40aa3e26d2fb4c5e3a2107b61f434f14aa1b8ba5c1384a8ef35f88e7f
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QU:riAyLN9aa+9U2rW1ip6pr2At7NZuQU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 3ad486fd7788db7765ba191096940d50N.exe -
resource yara_rule behavioral1/memory/2808-0-0x0000000001350000-0x0000000001378000-memory.dmp upx behavioral1/files/0x00080000000173de-2.dat upx behavioral1/memory/2712-7-0x0000000000D70000-0x0000000000D98000-memory.dmp upx behavioral1/memory/2808-8-0x0000000001350000-0x0000000001378000-memory.dmp upx behavioral1/memory/2712-10-0x0000000000D70000-0x0000000000D98000-memory.dmp upx behavioral1/memory/2808-11-0x0000000001350000-0x0000000001378000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 3ad486fd7788db7765ba191096940d50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2712 2808 3ad486fd7788db7765ba191096940d50N.exe 30 PID 2808 wrote to memory of 2712 2808 3ad486fd7788db7765ba191096940d50N.exe 30 PID 2808 wrote to memory of 2712 2808 3ad486fd7788db7765ba191096940d50N.exe 30 PID 2808 wrote to memory of 2712 2808 3ad486fd7788db7765ba191096940d50N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ad486fd7788db7765ba191096940d50N.exe"C:\Users\Admin\AppData\Local\Temp\3ad486fd7788db7765ba191096940d50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5181dff3a07f240363f2766e7778ce4b5
SHA13d22c4e162d26282b8dd6e5aee546b6ba8ab7aad
SHA2565aaf1e18b44366d7a21fb0c2a7cc083ec8044d833ee938c2ae26a929efd0bde5
SHA5129a643cc839ee6c8d79f07c0a36d39abeefab0f0056cddbcc25a1a6b8a25093e0d8766bd893481ed4974bc9685f8f1e37a9f28ddfbbf3493585ffaba4f11c4642