Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 23:14
Behavioral task
behavioral1
Sample
260de2c208fb65871ca1b0b8758f8f50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
260de2c208fb65871ca1b0b8758f8f50N.exe
Resource
win10v2004-20240802-en
General
-
Target
260de2c208fb65871ca1b0b8758f8f50N.exe
-
Size
135KB
-
MD5
260de2c208fb65871ca1b0b8758f8f50
-
SHA1
ac507e81093dac4cf7329b4d6ddddbe9d9e376e2
-
SHA256
a3186456751497106eee3ecbfc4a6cdca92ca92daba2a21c9e358ad59ac57265
-
SHA512
425a7e2630f62121685f526e68c934176c499cb970e1041223ff26d7fad47dd1f250c84f5e629208b949f2198f5c5a065539e62c99c9a244e5d6de7d5d28a526
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QI:riAyLN9aa+9U2rW1ip6pr2At7NZuQI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2676 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2560 260de2c208fb65871ca1b0b8758f8f50N.exe -
resource yara_rule behavioral1/memory/2560-0-0x0000000000E50000-0x0000000000E78000-memory.dmp upx behavioral1/files/0x000b000000018671-2.dat upx behavioral1/memory/2676-7-0x00000000012A0000-0x00000000012C8000-memory.dmp upx behavioral1/memory/2560-8-0x0000000000E50000-0x0000000000E78000-memory.dmp upx behavioral1/memory/2676-10-0x00000000012A0000-0x00000000012C8000-memory.dmp upx behavioral1/memory/2560-11-0x0000000000E50000-0x0000000000E78000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 260de2c208fb65871ca1b0b8758f8f50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 260de2c208fb65871ca1b0b8758f8f50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2676 2560 260de2c208fb65871ca1b0b8758f8f50N.exe 30 PID 2560 wrote to memory of 2676 2560 260de2c208fb65871ca1b0b8758f8f50N.exe 30 PID 2560 wrote to memory of 2676 2560 260de2c208fb65871ca1b0b8758f8f50N.exe 30 PID 2560 wrote to memory of 2676 2560 260de2c208fb65871ca1b0b8758f8f50N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\260de2c208fb65871ca1b0b8758f8f50N.exe"C:\Users\Admin\AppData\Local\Temp\260de2c208fb65871ca1b0b8758f8f50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD51509c34d6d1ba28e3052ab26f826ce2d
SHA197be805cdd495c26e451e2a26cdbeb7d0ad418a6
SHA2565a3cff781101069dd7922048e3df9399134686a21e192bd511a4542d59f1eed4
SHA512eebc3e647c7479db8a49d637678e1db0866aa41613ff68fb55db69087a96a38b627202e7b33cf8188e93457fd73828eb8da83218daaa333a37186fde92fe2411