Analysis
-
max time kernel
103s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 09:30
Behavioral task
behavioral1
Sample
269499a7b14a918d6bd9c7baee5bf3c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
269499a7b14a918d6bd9c7baee5bf3c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
269499a7b14a918d6bd9c7baee5bf3c0N.exe
-
Size
135KB
-
MD5
269499a7b14a918d6bd9c7baee5bf3c0
-
SHA1
247c5df647e1d8fdbf435ae802bc9a1a696f6b47
-
SHA256
79603a70e51ee9753816523df9c4d76b93ab44cc917c43bb53c05505b38aab7b
-
SHA512
ba8037560c42c0bba5665917c42276b873d28b6d55a1ddc1366fd152ec57b36dc4b59cce1c81c4b8ba9fa970b9973b3e1ddf2e030f5002afa162fdc624d98f83
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q3:riAyLN9aa+9U2rW1ip6pr2At7NZuQ3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3248 WwanSvc.exe -
resource yara_rule behavioral2/memory/2588-0-0x0000000000A80000-0x0000000000AA8000-memory.dmp upx behavioral2/memory/3248-4-0x0000000000E80000-0x0000000000EA8000-memory.dmp upx behavioral2/files/0x000700000002344d-3.dat upx behavioral2/memory/2588-6-0x0000000000A80000-0x0000000000AA8000-memory.dmp upx behavioral2/memory/3248-7-0x0000000000E80000-0x0000000000EA8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 269499a7b14a918d6bd9c7baee5bf3c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 269499a7b14a918d6bd9c7baee5bf3c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3248 2588 269499a7b14a918d6bd9c7baee5bf3c0N.exe 84 PID 2588 wrote to memory of 3248 2588 269499a7b14a918d6bd9c7baee5bf3c0N.exe 84 PID 2588 wrote to memory of 3248 2588 269499a7b14a918d6bd9c7baee5bf3c0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\269499a7b14a918d6bd9c7baee5bf3c0N.exe"C:\Users\Admin\AppData\Local\Temp\269499a7b14a918d6bd9c7baee5bf3c0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5dff4fe61673b9df01f6726566f3fe60f
SHA13420b060f0fb914472e75646dc9a5edff2406be0
SHA256742a8e8d898403c26edd8aa0d54ff4af8cfb3b0dcf8042397ee1d4c7ad4144eb
SHA512f2ea4a13e8919731b98b9ca93ccf2b105109c7b23ab1be3d6c8b6df8ae68927ab1a349ff05b3a2d5a2a27cfbbd81cc5249ef0e507a2326eedcf917006c1696d1