Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 19:57
Behavioral task
behavioral1
Sample
773f598e43f8ef5541942888d7bf5d50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
773f598e43f8ef5541942888d7bf5d50N.exe
Resource
win10v2004-20240802-en
General
-
Target
773f598e43f8ef5541942888d7bf5d50N.exe
-
Size
135KB
-
MD5
773f598e43f8ef5541942888d7bf5d50
-
SHA1
bee3f142bee79ea82651ac73d0a1afe6e7e3ecb9
-
SHA256
ea6ab90d577d2a18db94e8cf4fdaee97225b344ac1699e6d84b653eed3b1d948
-
SHA512
f72672848126ecd30b6910cbda98fe6b40f2409ef6642a13369a76779494a20517c263efaa5cf44cc784070e0d2412ee68692542de022403b2413ce4627813b6
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q9:riAyLN9aa+9U2rW1ip6pr2At7NZuQ9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 WwanSvc.exe -
resource yara_rule behavioral2/memory/4852-0-0x0000000000730000-0x0000000000758000-memory.dmp upx behavioral2/files/0x0008000000023467-3.dat upx behavioral2/memory/4852-6-0x0000000000730000-0x0000000000758000-memory.dmp upx behavioral2/memory/3036-4-0x0000000000580000-0x00000000005A8000-memory.dmp upx behavioral2/memory/3036-7-0x0000000000580000-0x00000000005A8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 773f598e43f8ef5541942888d7bf5d50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 773f598e43f8ef5541942888d7bf5d50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 3036 4852 773f598e43f8ef5541942888d7bf5d50N.exe 85 PID 4852 wrote to memory of 3036 4852 773f598e43f8ef5541942888d7bf5d50N.exe 85 PID 4852 wrote to memory of 3036 4852 773f598e43f8ef5541942888d7bf5d50N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\773f598e43f8ef5541942888d7bf5d50N.exe"C:\Users\Admin\AppData\Local\Temp\773f598e43f8ef5541942888d7bf5d50N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD54cdc3775798ed0f6c6838d89e7b2f9b1
SHA10489739d27d0710059ab61a9ad26c38241130a09
SHA256d8bba51c31da6d9cc38357ab1f5cd30823662d7a44faf74edd87797e3fa1d93c
SHA51251dbb9484af07e6dbb5551ad7ff60cce6ac2f167471ab77ede2e60c5ef10b2afaaf1d332e98f369fae9fc65f4a94eaf5fe04920e4e55ed0a31f3aea1adc37c1c