Analysis
-
max time kernel
103s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 03:13
Behavioral task
behavioral1
Sample
621e2ad93526c2e77898744517944400N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
621e2ad93526c2e77898744517944400N.exe
Resource
win10v2004-20240709-en
General
-
Target
621e2ad93526c2e77898744517944400N.exe
-
Size
134KB
-
MD5
621e2ad93526c2e77898744517944400
-
SHA1
73c018b3802f1c409a0e0c69275a2c7fa6068624
-
SHA256
c1a4493e45d1e8ebb3e0c04edf1819b775603ecaaddbaf0458599006e3a9e291
-
SHA512
aa242d1c312f5e25f786ed19401a605f4bf0374737086a919bb745af0921f35b2acc60ffb373459e0233df1bdfb40f19cd4d7733ed1f00ac4edcd9d8fb6b39dc
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QN:riAyLN9aa+9U2rW1ip6pr2At7NZuQN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 WwanSvc.exe -
resource yara_rule behavioral2/memory/1496-0-0x0000000000700000-0x0000000000728000-memory.dmp upx behavioral2/files/0x00080000000234a9-3.dat upx behavioral2/memory/1496-5-0x0000000000700000-0x0000000000728000-memory.dmp upx behavioral2/memory/2720-6-0x0000000000770000-0x0000000000798000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 621e2ad93526c2e77898744517944400N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 621e2ad93526c2e77898744517944400N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2720 1496 621e2ad93526c2e77898744517944400N.exe 84 PID 1496 wrote to memory of 2720 1496 621e2ad93526c2e77898744517944400N.exe 84 PID 1496 wrote to memory of 2720 1496 621e2ad93526c2e77898744517944400N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\621e2ad93526c2e77898744517944400N.exe"C:\Users\Admin\AppData\Local\Temp\621e2ad93526c2e77898744517944400N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD58e4339186eee5a3511a0391a6a696b46
SHA1731bdaa9b40d4a090a9b19333afd7ce99db39f85
SHA25627e529e1569ec04b1cde2a90dcf06dc234090afb7896acb4bde6cc4c2223d1a2
SHA512a58aaabeb20a81028715486f81d38cfa49be7c75998fed6afa9deac6e1b18bf5d8a9d7b5f36c63f04be16cbb75620d3a7b239b7b08aa33a247a26e2fd791fba3