Analysis
-
max time kernel
30s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 22:51
Behavioral task
behavioral1
Sample
1b4e7555cce061ef7c78a9af8a4d3c70N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1b4e7555cce061ef7c78a9af8a4d3c70N.exe
Resource
win10v2004-20240802-en
General
-
Target
1b4e7555cce061ef7c78a9af8a4d3c70N.exe
-
Size
134KB
-
MD5
1b4e7555cce061ef7c78a9af8a4d3c70
-
SHA1
ced9d86e33709c3b82b5a324dcf95bfc881a75da
-
SHA256
6c5bb3000f9033c937d54ce5764269029825779aa6a079146335570ac349be38
-
SHA512
19f468d83260b6918ea6bfb1f8522c7ac3c5fee562bb8f4dfddff608571d7874a958c7961a6030cb86ca1d98cb0b231ecf179e45068c58e11ab664e35102c6f5
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QKl:riAyLN9aa+9U2rW1ip6pr2At7NZuQE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 996 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 3036 1b4e7555cce061ef7c78a9af8a4d3c70N.exe -
resource yara_rule behavioral1/memory/3036-0-0x0000000000F10000-0x0000000000F38000-memory.dmp upx behavioral1/files/0x0007000000019603-5.dat upx behavioral1/memory/996-7-0x0000000000100000-0x0000000000128000-memory.dmp upx behavioral1/memory/3036-8-0x0000000000F10000-0x0000000000F38000-memory.dmp upx behavioral1/memory/996-10-0x0000000000100000-0x0000000000128000-memory.dmp upx behavioral1/memory/3036-11-0x0000000000F10000-0x0000000000F38000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 1b4e7555cce061ef7c78a9af8a4d3c70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b4e7555cce061ef7c78a9af8a4d3c70N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 996 3036 1b4e7555cce061ef7c78a9af8a4d3c70N.exe 29 PID 3036 wrote to memory of 996 3036 1b4e7555cce061ef7c78a9af8a4d3c70N.exe 29 PID 3036 wrote to memory of 996 3036 1b4e7555cce061ef7c78a9af8a4d3c70N.exe 29 PID 3036 wrote to memory of 996 3036 1b4e7555cce061ef7c78a9af8a4d3c70N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b4e7555cce061ef7c78a9af8a4d3c70N.exe"C:\Users\Admin\AppData\Local\Temp\1b4e7555cce061ef7c78a9af8a4d3c70N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD55c057b23040876bf5163206ece79f9e9
SHA1abd5b70af784033919afd64919137dcf190cc1cb
SHA2566850cc75b525ed4332230ec790e7d569a5248884e737f0ac446475499d2becab
SHA512fbe85860e57d54789e58a1bbb9b679bf9300bd5ad01a0d3227394fba398d16c2556e737d97042f3d8fafcaa85095e2a2b7113f953f00be0baeb4186c45fc9d20