Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 09:23

General

  • Target

    90c0c08fde767f3b281469386a16bc60N.exe

  • Size

    134KB

  • MD5

    90c0c08fde767f3b281469386a16bc60

  • SHA1

    a81c21708b6b9825541ca6c531cd89e77cf8bf00

  • SHA256

    d026410776996ad1b6222194537cf935e9db09e8e6d963c0ffbed524c62e620c

  • SHA512

    e0346867f35ece25e86fcae4d4de3e5c20bdecfe8bdf83d0a8d2d13ac4ede773501348a0b3fa181fd23d1c7013fa5aa73749db59a0a4f4252e5a12b9da9e20da

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qn:riAyLN9aa+9U2rW1ip6pr2At7NZuQn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90c0c08fde767f3b281469386a16bc60N.exe
    "C:\Users\Admin\AppData\Local\Temp\90c0c08fde767f3b281469386a16bc60N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    39eec2151da3681b2a91ac52775d8be1

    SHA1

    d535032a4b92f49243b55e4fe54f2cfe2d4b9477

    SHA256

    2467d383c4ce69d0561fa386711f86f28c70fdd864e2aabee8c9d90996d0683f

    SHA512

    d894b3289f05d27243f72056032a2a00d8280bdc063eee3d8f3d2c9fab57b7ca252b308e821b7b5f58dfd9d5d6a005b8884657d0390f69909038daa30229e8b6

  • memory/2116-7-0x00000000012D0000-0x00000000012F8000-memory.dmp

    Filesize

    160KB

  • memory/2960-1-0x0000000000B60000-0x0000000000B88000-memory.dmp

    Filesize

    160KB

  • memory/2960-4-0x00000000001B0000-0x00000000001D8000-memory.dmp

    Filesize

    160KB

  • memory/2960-8-0x0000000000B60000-0x0000000000B88000-memory.dmp

    Filesize

    160KB