Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 14:05
Behavioral task
behavioral1
Sample
9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe
Resource
win10v2004-20240802-en
General
-
Target
9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe
-
Size
135KB
-
MD5
9b5d597e4d5ab2aa6ddf45eff7bcf720
-
SHA1
6ba2abf3f523cd09130e2c530da1f9e8514a8879
-
SHA256
a3eb054c8a332d6955e8196a31c771828d3608b0ea3aa99d171d60687c5fe007
-
SHA512
3b5bb28ab7b7556ee3d0582a13d85c0e6794a91cd12467a50333e30f31caaf5afc2b1dc079fe72601ce62270e0d2459d5eccc025d07d16a0b87f0654fa7f892f
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q1:riAyLN9aa+9U2rW1ip6pr2At7NZuQ1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3876 WwanSvc.exe -
resource yara_rule behavioral2/memory/4948-0-0x0000000000D40000-0x0000000000D68000-memory.dmp upx behavioral2/files/0x0008000000023490-3.dat upx behavioral2/memory/4948-4-0x0000000000D40000-0x0000000000D68000-memory.dmp upx behavioral2/memory/3876-6-0x0000000000870000-0x0000000000898000-memory.dmp upx behavioral2/memory/3876-7-0x0000000000870000-0x0000000000898000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3876 4948 9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe 83 PID 4948 wrote to memory of 3876 4948 9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe 83 PID 4948 wrote to memory of 3876 4948 9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe"C:\Users\Admin\AppData\Local\Temp\9b5d597e4d5ab2aa6ddf45eff7bcf720N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD59f35fc831f00574118517bed454398de
SHA1f6cf2c4b5448f7aa3d2d0346bc50df489b81b9a5
SHA2568f2df18eee09c1aeced7598c6cd97ebd2d41f20ccabe85ea5d8b299cef757034
SHA512267e907d769b30edac1c6fa7241650b613a00772736f3212b3d7fa05c0dfff4d70132e8f80c8ed8d67d3855f37889cc02c89ad2d21ae2391c6ca5686074a3cbf