Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 02:51
Behavioral task
behavioral1
Sample
513c2a2a6c03c6b17e727e34a2c63a70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
513c2a2a6c03c6b17e727e34a2c63a70N.exe
Resource
win10v2004-20240802-en
General
-
Target
513c2a2a6c03c6b17e727e34a2c63a70N.exe
-
Size
134KB
-
MD5
513c2a2a6c03c6b17e727e34a2c63a70
-
SHA1
2ede73f4b33be29be0b440ae8c4797ab05145c08
-
SHA256
5fe3a49c79ed8fad91c99fcba8569867b8f0dc18d77bf63540eeb8e51318db87
-
SHA512
06716d96b05a9d83aaa76ec460293b888c82e83f8287a850c04437b0f25a046c1a2f53d3453888f6ce4eb75560c0eb570aaaaf275247552a1205fa77ea1bd5bc
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QJ:riAyLN9aa+9U2rW1ip6pr2At7NZuQJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1440 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 513c2a2a6c03c6b17e727e34a2c63a70N.exe -
resource yara_rule behavioral1/memory/2360-1-0x0000000000CE0000-0x0000000000D08000-memory.dmp upx behavioral1/files/0x00080000000174ab-2.dat upx behavioral1/memory/1440-7-0x0000000000AF0000-0x0000000000B18000-memory.dmp upx behavioral1/memory/1440-9-0x0000000000AF0000-0x0000000000B18000-memory.dmp upx behavioral1/memory/2360-10-0x0000000000CE0000-0x0000000000D08000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 513c2a2a6c03c6b17e727e34a2c63a70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 513c2a2a6c03c6b17e727e34a2c63a70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1440 2360 513c2a2a6c03c6b17e727e34a2c63a70N.exe 30 PID 2360 wrote to memory of 1440 2360 513c2a2a6c03c6b17e727e34a2c63a70N.exe 30 PID 2360 wrote to memory of 1440 2360 513c2a2a6c03c6b17e727e34a2c63a70N.exe 30 PID 2360 wrote to memory of 1440 2360 513c2a2a6c03c6b17e727e34a2c63a70N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\513c2a2a6c03c6b17e727e34a2c63a70N.exe"C:\Users\Admin\AppData\Local\Temp\513c2a2a6c03c6b17e727e34a2c63a70N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54b82bf9a3d3672feffb94753402bdae1
SHA157de9cd6af0011b254dfde2ccebeaefbf0fb9bd9
SHA256e95b36279e57eed039900dbcf5473ac1b11c07c00a595b0dff6521b7ca3f309c
SHA512059c0b8edfe0ae82f25073d8b842c77a76269c26a0c181820395cf5d4b2c1b4733f35460b88558e89b8d21f283cde5fe2b7fde7dc3a3c4baca6bc9f19e3b496a