Analysis
-
max time kernel
101s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 00:00
Behavioral task
behavioral1
Sample
6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe
Resource
win10v2004-20240709-en
General
-
Target
6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe
-
Size
134KB
-
MD5
6ea7a8d51b1a5cdc891ab33c9cfe0820
-
SHA1
a37673b9249d67ea8ee7f13df765cb7de4239fef
-
SHA256
a54a7ad7ca17ba2ebdc35edbd0ed5d49bf3dc31fbb3770ef3916cfa6a4a9052f
-
SHA512
4066061f6259eb8d51bae2629ecfc41f03b229c5be2676cf5bd9d6011a3b5f409e8cecb11763e05c33c7091cd502f0a7289ac117592a131ca3a40c99a7424d46
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QL:riAyLN9aa+9U2rW1ip6pr2At7NZuQL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5084 WwanSvc.exe -
resource yara_rule behavioral2/memory/3312-0-0x0000000000580000-0x00000000005A8000-memory.dmp upx behavioral2/memory/3312-5-0x0000000000580000-0x00000000005A8000-memory.dmp upx behavioral2/memory/5084-6-0x00000000009D0000-0x00000000009F8000-memory.dmp upx behavioral2/files/0x000800000002347f-4.dat upx behavioral2/memory/5084-7-0x00000000009D0000-0x00000000009F8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3312 wrote to memory of 5084 3312 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 84 PID 3312 wrote to memory of 5084 3312 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 84 PID 3312 wrote to memory of 5084 3312 6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe"C:\Users\Admin\AppData\Local\Temp\6ea7a8d51b1a5cdc891ab33c9cfe0820N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56484de4a090c73fcc507fb3da412c8e0
SHA1db438a6373554e039abe47875f6c7791132f2c22
SHA256f87185a442ec6ea94b70f54e3a833412b08cf8863a8a8e4302139d2bade9a0d6
SHA512eb86920f26b32facccda662efc6b217fe182bc947ef4da2ca4a746430776479b67b9cf4d0ed0d145d3db07ef6f4aa304549a73b58c3d052b5c6dd992baf6a5e5