Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 23:14
Behavioral task
behavioral1
Sample
260de2c208fb65871ca1b0b8758f8f50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
260de2c208fb65871ca1b0b8758f8f50N.exe
Resource
win10v2004-20240802-en
General
-
Target
260de2c208fb65871ca1b0b8758f8f50N.exe
-
Size
135KB
-
MD5
260de2c208fb65871ca1b0b8758f8f50
-
SHA1
ac507e81093dac4cf7329b4d6ddddbe9d9e376e2
-
SHA256
a3186456751497106eee3ecbfc4a6cdca92ca92daba2a21c9e358ad59ac57265
-
SHA512
425a7e2630f62121685f526e68c934176c499cb970e1041223ff26d7fad47dd1f250c84f5e629208b949f2198f5c5a065539e62c99c9a244e5d6de7d5d28a526
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QI:riAyLN9aa+9U2rW1ip6pr2At7NZuQI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 224 WwanSvc.exe -
resource yara_rule behavioral2/memory/532-0-0x0000000000EF0000-0x0000000000F18000-memory.dmp upx behavioral2/files/0x0008000000023503-3.dat upx behavioral2/memory/224-6-0x00000000000E0000-0x0000000000108000-memory.dmp upx behavioral2/memory/532-5-0x0000000000EF0000-0x0000000000F18000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 260de2c208fb65871ca1b0b8758f8f50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 260de2c208fb65871ca1b0b8758f8f50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 532 wrote to memory of 224 532 260de2c208fb65871ca1b0b8758f8f50N.exe 83 PID 532 wrote to memory of 224 532 260de2c208fb65871ca1b0b8758f8f50N.exe 83 PID 532 wrote to memory of 224 532 260de2c208fb65871ca1b0b8758f8f50N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\260de2c208fb65871ca1b0b8758f8f50N.exe"C:\Users\Admin\AppData\Local\Temp\260de2c208fb65871ca1b0b8758f8f50N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5d68da2fde62f9108309f358a0dbc4594
SHA1fe4c9ae403ba512610dcb9176da3e1a56e95eef6
SHA256ffbd62df3223dce6c9cd63d91ef6db08d7679d51c845641ae6184a4b853130e6
SHA5129558d12562b5389086d4b6411b8006da17ecff1171fb6949ab4967cadb0822b8c199acfef85757e310574116251daa7516c6939e644fd8acdfbf057df02aedf3