Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 13:14
Behavioral task
behavioral1
Sample
b5b35f2d87dbdb4d521336f5d8918e70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5b35f2d87dbdb4d521336f5d8918e70N.exe
Resource
win10v2004-20240709-en
General
-
Target
b5b35f2d87dbdb4d521336f5d8918e70N.exe
-
Size
134KB
-
MD5
b5b35f2d87dbdb4d521336f5d8918e70
-
SHA1
69b38fbbe7e4892f54fd17ce5c8efed7ecf6af3b
-
SHA256
240fc1bf7931cc1b5368a0f85035f505f8f4db5ffe6a3d1f4348ed8280ca0f16
-
SHA512
45839214bb4e076d57a5eb811e6c169bbd4e878bcdfecfa2295423b2e665a4b8f3a9a721aadb23e337f14b2737969e912172cf4d55107ad2f889ab68ec57c580
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QJ:riAyLN9aa+9U2rW1ip6pr2At7NZuQJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3968 WwanSvc.exe -
resource yara_rule behavioral2/memory/4404-0-0x0000000000600000-0x0000000000628000-memory.dmp upx behavioral2/files/0x00080000000234c5-3.dat upx behavioral2/memory/3968-6-0x0000000000CC0000-0x0000000000CE8000-memory.dmp upx behavioral2/memory/4404-4-0x0000000000600000-0x0000000000628000-memory.dmp upx behavioral2/memory/3968-7-0x0000000000CC0000-0x0000000000CE8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" b5b35f2d87dbdb4d521336f5d8918e70N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3968 4404 b5b35f2d87dbdb4d521336f5d8918e70N.exe 84 PID 4404 wrote to memory of 3968 4404 b5b35f2d87dbdb4d521336f5d8918e70N.exe 84 PID 4404 wrote to memory of 3968 4404 b5b35f2d87dbdb4d521336f5d8918e70N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b35f2d87dbdb4d521336f5d8918e70N.exe"C:\Users\Admin\AppData\Local\Temp\b5b35f2d87dbdb4d521336f5d8918e70N.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:3968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56c0f9525c0da7b98a9e7533c2086978b
SHA1f3218352421ca4653cfe0ea0fd70c821adf3ed1a
SHA2564d48d22a61938861d238e17451a0cd9cd9489bb69b4940af8d6bb18868a068e3
SHA512dba49409c0286c9190456998aedbf05bf4ba9f7fcb76c39c73d89ebc7cac836994f8d58eb54f2f02ba784e6230015d0d70bfd22de16ea114ad723052782fd08e