Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 04:10

General

  • Target

    49f97f80cac21a5f4cd60388b8c5af80N.exe

  • Size

    97KB

  • MD5

    49f97f80cac21a5f4cd60388b8c5af80

  • SHA1

    2c40023629daf4dec3fbcad6976109f4dad8d504

  • SHA256

    b9d448d8609936ae3b4373d39b259a98e570983d04970b89a5b38bd0cdfdba0b

  • SHA512

    6b4f0db29e5a8e006dad9d5d3660ffad9bc757eb9d612f6f93b0abef4db04f718807c723219fd52379fcdbde1e56adf312a6b0f64774ed4fc6663409c9da3192

  • SSDEEP

    1536:iF0AJzLopHG9aa+9qX3apJoAKWYr0vcioyjp2RXKTzRZICrWaGZh7U:iiApLN9aa+9U2EWyipjp2R6JJrWNZa

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49f97f80cac21a5f4cd60388b8c5af80N.exe
    "C:\Users\Admin\AppData\Local\Temp\49f97f80cac21a5f4cd60388b8c5af80N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\WwanSvc.exe

    Filesize

    97KB

    MD5

    1050052996f4081fb125284a8fe9def6

    SHA1

    69384cdfc5d783b49097a0690581e2337882a56a

    SHA256

    353db3222e9db85c0090e692a52c2d24d1a8fc5eef593b6a8a901e50c1c8c250

    SHA512

    1a1394d42167dfc193a8c10268d08ca6d5cc09ea9e816c773cd6861070aff4bf7c2f57efe3f4b415032a5935560aa4e5e2644a9aa9a592ced9237bce6b74f004

  • memory/4492-4-0x0000000000430000-0x000000000044E000-memory.dmp

    Filesize

    120KB

  • memory/4492-7-0x0000000000430000-0x000000000044E000-memory.dmp

    Filesize

    120KB

  • memory/5040-0-0x00000000001F0000-0x000000000020E000-memory.dmp

    Filesize

    120KB

  • memory/5040-6-0x00000000001F0000-0x000000000020E000-memory.dmp

    Filesize

    120KB