Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
49f97f80cac21a5f4cd60388b8c5af80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49f97f80cac21a5f4cd60388b8c5af80N.exe
Resource
win10v2004-20240802-en
General
-
Target
49f97f80cac21a5f4cd60388b8c5af80N.exe
-
Size
97KB
-
MD5
49f97f80cac21a5f4cd60388b8c5af80
-
SHA1
2c40023629daf4dec3fbcad6976109f4dad8d504
-
SHA256
b9d448d8609936ae3b4373d39b259a98e570983d04970b89a5b38bd0cdfdba0b
-
SHA512
6b4f0db29e5a8e006dad9d5d3660ffad9bc757eb9d612f6f93b0abef4db04f718807c723219fd52379fcdbde1e56adf312a6b0f64774ed4fc6663409c9da3192
-
SSDEEP
1536:iF0AJzLopHG9aa+9qX3apJoAKWYr0vcioyjp2RXKTzRZICrWaGZh7U:iiApLN9aa+9U2EWyipjp2R6JJrWNZa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4492 WwanSvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 49f97f80cac21a5f4cd60388b8c5af80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49f97f80cac21a5f4cd60388b8c5af80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4492 5040 49f97f80cac21a5f4cd60388b8c5af80N.exe 82 PID 5040 wrote to memory of 4492 5040 49f97f80cac21a5f4cd60388b8c5af80N.exe 82 PID 5040 wrote to memory of 4492 5040 49f97f80cac21a5f4cd60388b8c5af80N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\49f97f80cac21a5f4cd60388b8c5af80N.exe"C:\Users\Admin\AppData\Local\Temp\49f97f80cac21a5f4cd60388b8c5af80N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD51050052996f4081fb125284a8fe9def6
SHA169384cdfc5d783b49097a0690581e2337882a56a
SHA256353db3222e9db85c0090e692a52c2d24d1a8fc5eef593b6a8a901e50c1c8c250
SHA5121a1394d42167dfc193a8c10268d08ca6d5cc09ea9e816c773cd6861070aff4bf7c2f57efe3f4b415032a5935560aa4e5e2644a9aa9a592ced9237bce6b74f004