Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 10:36
Behavioral task
behavioral1
Sample
a662c1373cbc53c1c20dafc7a316b810N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a662c1373cbc53c1c20dafc7a316b810N.exe
Resource
win10v2004-20240709-en
General
-
Target
a662c1373cbc53c1c20dafc7a316b810N.exe
-
Size
134KB
-
MD5
a662c1373cbc53c1c20dafc7a316b810
-
SHA1
b60cdc3bd1bd1ffa4ba89d35d66bb28b686703c9
-
SHA256
83fff1e3a3cfc7067323aa374abf9ab2da1fa100cbe9371e30203bb20e24d724
-
SHA512
8676cf964b7b8541ba575f22ebb1d1af3ac6fda8b0cb191c6b455c448fa9d201f6afb55b6b18a74f383ea1590eca1547858c930ab6598d952aafc2bc8bf9adff
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qi:riAyLN9aa+9U2rW1ip6pr2At7NZuQi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2708 a662c1373cbc53c1c20dafc7a316b810N.exe -
resource yara_rule behavioral1/files/0x0008000000016d46-2.dat upx behavioral1/memory/2708-1-0x0000000000880000-0x00000000008A8000-memory.dmp upx behavioral1/memory/2132-6-0x0000000000940000-0x0000000000968000-memory.dmp upx behavioral1/memory/2132-8-0x0000000000940000-0x0000000000968000-memory.dmp upx behavioral1/memory/2708-9-0x0000000000880000-0x00000000008A8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" a662c1373cbc53c1c20dafc7a316b810N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2132 2708 a662c1373cbc53c1c20dafc7a316b810N.exe 30 PID 2708 wrote to memory of 2132 2708 a662c1373cbc53c1c20dafc7a316b810N.exe 30 PID 2708 wrote to memory of 2132 2708 a662c1373cbc53c1c20dafc7a316b810N.exe 30 PID 2708 wrote to memory of 2132 2708 a662c1373cbc53c1c20dafc7a316b810N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a662c1373cbc53c1c20dafc7a316b810N.exe"C:\Users\Admin\AppData\Local\Temp\a662c1373cbc53c1c20dafc7a316b810N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f31d2628cb2a8cf4a880ce4030626d86
SHA1fed844326d3764bd39b73963fde454004d8acd9f
SHA2569bd3db0059ebb8c39ebced701c325c52dc80e03bf1488ed4760bebea2b15929d
SHA5124dbd83826659f786b056e40fda5f8a0387ebe5866aca5b21491d8dcf080e1e800a2173e88b827cea22392ca577120030030adefb69212df505b29ad7877a1853