Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 07:03
Behavioral task
behavioral1
Sample
a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe
-
Size
135KB
-
MD5
a1fb1b1f841bf841cfe0b027ff6f6bc0
-
SHA1
20d6d228328b67ec4d6d924b3b8102a3e803f0e0
-
SHA256
9e771d397008052c95fae64714155e918d5d9852d068529b260a36c943df7c85
-
SHA512
62e37f0c34699845218f835b0953dc1475f8d5ce4782da74f9739dbf8570cdfe1658bd6061c81ed7efdb5aec3b277f9dad7321a88685f4587233246247944f00
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qb:riAyLN9aa+9U2rW1ip6pr2At7NZuQb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 WwanSvc.exe -
resource yara_rule behavioral2/memory/780-0-0x0000000000790000-0x00000000007B8000-memory.dmp upx behavioral2/files/0x00080000000234bb-3.dat upx behavioral2/memory/2780-4-0x00000000000E0000-0x0000000000108000-memory.dmp upx behavioral2/memory/780-5-0x0000000000790000-0x00000000007B8000-memory.dmp upx behavioral2/memory/2780-7-0x00000000000E0000-0x0000000000108000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 780 wrote to memory of 2780 780 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 84 PID 780 wrote to memory of 2780 780 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 84 PID 780 wrote to memory of 2780 780 a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe"C:\Users\Admin\AppData\Local\Temp\a1fb1b1f841bf841cfe0b027ff6f6bc0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD59be2ce6a0e385c46a72625361eed02fb
SHA136b4c896f65643f9f60e75dc8ce84f9f68c12869
SHA2565accbc148d2196245279af1e5bd579247cadbcdbdec8ab35c3f999120bd13c6b
SHA5122643a2b3166801c87d1d312fa6804fdaba6a0da0f932a7cfbe7212709d980e42bcc6e565d16850cd02662ff4313bdfcc33f93debaa7da9697dd05da018125160