Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 11:23
Behavioral task
behavioral1
Sample
9837500a3ac40b793d6265ffb799cf90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9837500a3ac40b793d6265ffb799cf90N.exe
Resource
win10v2004-20240730-en
General
-
Target
9837500a3ac40b793d6265ffb799cf90N.exe
-
Size
134KB
-
MD5
9837500a3ac40b793d6265ffb799cf90
-
SHA1
381919df987fdf7a26e2de95c7b9965b1b137a96
-
SHA256
50c4f3d12114e2a0ea2b5846292fb7194f86143e0f83554ee594848f8761b810
-
SHA512
a8ac184da7f455336ba985b33580cdbf619015c2d355a2449ee94334276cb77dcfd9c6938b4d7561be7ffc97e3fcf3991d6d3fdfa228abf6cd5da005fae65c99
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QfQ:riAyLN9aa+9U2rW1ip6pr2At7NZuQo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3928 WwanSvc.exe -
resource yara_rule behavioral2/memory/1996-0-0x0000000000460000-0x0000000000488000-memory.dmp upx behavioral2/memory/3928-4-0x0000000000470000-0x0000000000498000-memory.dmp upx behavioral2/files/0x000800000002344a-3.dat upx behavioral2/memory/1996-6-0x0000000000460000-0x0000000000488000-memory.dmp upx behavioral2/memory/3928-7-0x0000000000470000-0x0000000000498000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 9837500a3ac40b793d6265ffb799cf90N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9837500a3ac40b793d6265ffb799cf90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3928 1996 9837500a3ac40b793d6265ffb799cf90N.exe 83 PID 1996 wrote to memory of 3928 1996 9837500a3ac40b793d6265ffb799cf90N.exe 83 PID 1996 wrote to memory of 3928 1996 9837500a3ac40b793d6265ffb799cf90N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9837500a3ac40b793d6265ffb799cf90N.exe"C:\Users\Admin\AppData\Local\Temp\9837500a3ac40b793d6265ffb799cf90N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5148b1864628f0ad1be6290d2ef9748ab
SHA16be666092b8dfbb13b439b6596e418a794c6e213
SHA25613ccee6ba52d3df0f972cc10268c838d5deababe293da2a211f7cc5471cbf754
SHA5123ae8230ea944c1eaeb8d5d8df4ba389f55a3d7371a2ad98ab9d760ef372e3ac5c3c8f0e0a23abcf8dc2f654e02acef3b46bc5194ad83afba363b9dc92663ed26