Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 07:03
Behavioral task
behavioral1
Sample
a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe
-
Size
135KB
-
MD5
a1fb1b1f841bf841cfe0b027ff6f6bc0
-
SHA1
20d6d228328b67ec4d6d924b3b8102a3e803f0e0
-
SHA256
9e771d397008052c95fae64714155e918d5d9852d068529b260a36c943df7c85
-
SHA512
62e37f0c34699845218f835b0953dc1475f8d5ce4782da74f9739dbf8570cdfe1658bd6061c81ed7efdb5aec3b277f9dad7321a88685f4587233246247944f00
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qb:riAyLN9aa+9U2rW1ip6pr2At7NZuQb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe -
resource yara_rule behavioral1/memory/1696-0-0x0000000001190000-0x00000000011B8000-memory.dmp upx behavioral1/files/0x000700000001921e-2.dat upx behavioral1/memory/1720-7-0x0000000000E00000-0x0000000000E28000-memory.dmp upx behavioral1/memory/1696-8-0x0000000001190000-0x00000000011B8000-memory.dmp upx behavioral1/memory/1720-10-0x0000000000E00000-0x0000000000E28000-memory.dmp upx behavioral1/memory/1696-11-0x0000000001190000-0x00000000011B8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1720 1696 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 30 PID 1696 wrote to memory of 1720 1696 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 30 PID 1696 wrote to memory of 1720 1696 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 30 PID 1696 wrote to memory of 1720 1696 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe"C:\Users\Admin\AppData\Local\Temp\a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD55cc0943ccf992d81bf1d7f80c8abd5fd
SHA14b367c2303eb52a126cf47f0cdea5454ea511de5
SHA25669b2bb95b47b66c6714687143f6d70797bdf862acec9a895e54fed82e6708801
SHA512a75fd7b57130bc060d0ae23f679e74345e488b26e3063b56b54a0bfbd59f7c2eed5987075a6c85cb8b4082b6e75de7de9527a680e6d0865b22543a75ba075456