Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 09:23
Behavioral task
behavioral1
Sample
90c0c08fde767f3b281469386a16bc60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
90c0c08fde767f3b281469386a16bc60N.exe
Resource
win10v2004-20240709-en
General
-
Target
90c0c08fde767f3b281469386a16bc60N.exe
-
Size
134KB
-
MD5
90c0c08fde767f3b281469386a16bc60
-
SHA1
a81c21708b6b9825541ca6c531cd89e77cf8bf00
-
SHA256
d026410776996ad1b6222194537cf935e9db09e8e6d963c0ffbed524c62e620c
-
SHA512
e0346867f35ece25e86fcae4d4de3e5c20bdecfe8bdf83d0a8d2d13ac4ede773501348a0b3fa181fd23d1c7013fa5aa73749db59a0a4f4252e5a12b9da9e20da
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qn:riAyLN9aa+9U2rW1ip6pr2At7NZuQn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2116 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 90c0c08fde767f3b281469386a16bc60N.exe -
resource yara_rule behavioral1/memory/2960-1-0x0000000000B60000-0x0000000000B88000-memory.dmp upx behavioral1/files/0x0008000000017429-2.dat upx behavioral1/memory/2960-4-0x00000000001B0000-0x00000000001D8000-memory.dmp upx behavioral1/memory/2116-7-0x00000000012D0000-0x00000000012F8000-memory.dmp upx behavioral1/memory/2960-8-0x0000000000B60000-0x0000000000B88000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 90c0c08fde767f3b281469386a16bc60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2116 2960 90c0c08fde767f3b281469386a16bc60N.exe 30 PID 2960 wrote to memory of 2116 2960 90c0c08fde767f3b281469386a16bc60N.exe 30 PID 2960 wrote to memory of 2116 2960 90c0c08fde767f3b281469386a16bc60N.exe 30 PID 2960 wrote to memory of 2116 2960 90c0c08fde767f3b281469386a16bc60N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\90c0c08fde767f3b281469386a16bc60N.exe"C:\Users\Admin\AppData\Local\Temp\90c0c08fde767f3b281469386a16bc60N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD539eec2151da3681b2a91ac52775d8be1
SHA1d535032a4b92f49243b55e4fe54f2cfe2d4b9477
SHA2562467d383c4ce69d0561fa386711f86f28c70fdd864e2aabee8c9d90996d0683f
SHA512d894b3289f05d27243f72056032a2a00d8280bdc063eee3d8f3d2c9fab57b7ca252b308e821b7b5f58dfd9d5d6a005b8884657d0390f69909038daa30229e8b6