Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 21:18
Behavioral task
behavioral1
Sample
aa63f3d04cb50de8d53dcf9b12d2d660N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa63f3d04cb50de8d53dcf9b12d2d660N.exe
Resource
win10v2004-20240802-en
General
-
Target
aa63f3d04cb50de8d53dcf9b12d2d660N.exe
-
Size
134KB
-
MD5
aa63f3d04cb50de8d53dcf9b12d2d660
-
SHA1
c666fe81ae4f0681d62645c36badcb6a896e964d
-
SHA256
f06b396d623bc38a1f4f4730ac109408de47d1adbc487555a3b3d7a182ec212a
-
SHA512
521cccc4520fcab4e054236175c5dbc833974a0f12e0a9b56a88f9e94ff2933db882543b71955ac51b2a94c8aca64fa47a4d865ede1daad657c2d4a465c7c3f6
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qg:riAyLN9aa+9U2rW1ip6pr2At7NZuQg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1832 WwanSvc.exe -
resource yara_rule behavioral2/memory/5092-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x00080000000235de-3.dat upx behavioral2/memory/1832-4-0x0000000000BC0000-0x0000000000BE8000-memory.dmp upx behavioral2/memory/5092-6-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1832-7-0x0000000000BC0000-0x0000000000BE8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" aa63f3d04cb50de8d53dcf9b12d2d660N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa63f3d04cb50de8d53dcf9b12d2d660N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5092 wrote to memory of 1832 5092 aa63f3d04cb50de8d53dcf9b12d2d660N.exe 89 PID 5092 wrote to memory of 1832 5092 aa63f3d04cb50de8d53dcf9b12d2d660N.exe 89 PID 5092 wrote to memory of 1832 5092 aa63f3d04cb50de8d53dcf9b12d2d660N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa63f3d04cb50de8d53dcf9b12d2d660N.exe"C:\Users\Admin\AppData\Local\Temp\aa63f3d04cb50de8d53dcf9b12d2d660N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4016 /prefetch:81⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5171386aa4db3cce352ff2c20474e40cf
SHA13a00dbca678e6835370111d6897de97f94fd6587
SHA2561a6f9bbbb0e2e550cd1da36aa7dfe27b3928402a65b2b302759dd42a49a37047
SHA512a418001ebf82b6595164a505094f13beb1ad9e441cdf675394ceae687a67f987da169afb66359a8786c856ab894cac9f8b3403e6e034b9b95e6d4fee521798f4