Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 00:00
Behavioral task
behavioral1
Sample
6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe
Resource
win10v2004-20240709-en
General
-
Target
6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe
-
Size
134KB
-
MD5
6ea7a8d51b1a5cdc891ab33c9cfe0820
-
SHA1
a37673b9249d67ea8ee7f13df765cb7de4239fef
-
SHA256
a54a7ad7ca17ba2ebdc35edbd0ed5d49bf3dc31fbb3770ef3916cfa6a4a9052f
-
SHA512
4066061f6259eb8d51bae2629ecfc41f03b229c5be2676cf5bd9d6011a3b5f409e8cecb11763e05c33c7091cd502f0a7289ac117592a131ca3a40c99a7424d46
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QL:riAyLN9aa+9U2rW1ip6pr2At7NZuQL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe -
resource yara_rule behavioral1/memory/1628-0-0x0000000000100000-0x0000000000128000-memory.dmp upx behavioral1/files/0x00080000000194e5-2.dat upx behavioral1/memory/2584-7-0x00000000009E0000-0x0000000000A08000-memory.dmp upx behavioral1/memory/1628-8-0x0000000000100000-0x0000000000128000-memory.dmp upx behavioral1/memory/2584-10-0x00000000009E0000-0x0000000000A08000-memory.dmp upx behavioral1/memory/1628-11-0x0000000000100000-0x0000000000128000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2584 1628 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 30 PID 1628 wrote to memory of 2584 1628 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 30 PID 1628 wrote to memory of 2584 1628 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 30 PID 1628 wrote to memory of 2584 1628 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe"C:\Users\Admin\AppData\Local\Temp\6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5d22b9e2238fc1da862762f66ea89c76a
SHA1d3a9eb3887218dad7c32c24ccd61651a6e903d66
SHA256af129b42ac1705ad2a6e5cfa7f4b58e2c1439b5d4a8541ab1b7d2f42e5a3e471
SHA5121550ffeac31129e77f66a2b1e7647219858f2600c0e1096815b8acae48a48b16b3fa6ea8c37d7046ece8ba9418034189146bb50d1f64275cee835fbb16eb3a71