Analysis
-
max time kernel
105s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 10:36
Behavioral task
behavioral1
Sample
a662c1373cbc53c1c20dafc7a316b810N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a662c1373cbc53c1c20dafc7a316b810N.exe
Resource
win10v2004-20240709-en
General
-
Target
a662c1373cbc53c1c20dafc7a316b810N.exe
-
Size
134KB
-
MD5
a662c1373cbc53c1c20dafc7a316b810
-
SHA1
b60cdc3bd1bd1ffa4ba89d35d66bb28b686703c9
-
SHA256
83fff1e3a3cfc7067323aa374abf9ab2da1fa100cbe9371e30203bb20e24d724
-
SHA512
8676cf964b7b8541ba575f22ebb1d1af3ac6fda8b0cb191c6b455c448fa9d201f6afb55b6b18a74f383ea1590eca1547858c930ab6598d952aafc2bc8bf9adff
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qi:riAyLN9aa+9U2rW1ip6pr2At7NZuQi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 WwanSvc.exe -
resource yara_rule behavioral2/memory/4124-0-0x0000000000A90000-0x0000000000AB8000-memory.dmp upx behavioral2/memory/4124-6-0x0000000000A90000-0x0000000000AB8000-memory.dmp upx behavioral2/memory/1968-5-0x0000000000A50000-0x0000000000A78000-memory.dmp upx behavioral2/files/0x00080000000234ab-4.dat upx behavioral2/memory/1968-7-0x0000000000A50000-0x0000000000A78000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" a662c1373cbc53c1c20dafc7a316b810N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 1968 4124 a662c1373cbc53c1c20dafc7a316b810N.exe 84 PID 4124 wrote to memory of 1968 4124 a662c1373cbc53c1c20dafc7a316b810N.exe 84 PID 4124 wrote to memory of 1968 4124 a662c1373cbc53c1c20dafc7a316b810N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a662c1373cbc53c1c20dafc7a316b810N.exe"C:\Users\Admin\AppData\Local\Temp\a662c1373cbc53c1c20dafc7a316b810N.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5cf949e9b53fce4612d2c0355f2603fba
SHA100d3380ac1fce104868cdd0f01d1b2d9c4c39331
SHA2568f23cffc527b01344db53d6638e9a2ed7fe0e03141714f6c251fe7a6d4c9492e
SHA512e18eb26fcd8f36f7f7b787c557805004a7c3df01cedd67738d73e91f478c3088035716a0a7ef0cd51e4e9528b05bffdf97f53de5f62df214fbb212e04a3c080b