Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 11:08
Behavioral task
behavioral1
Sample
eaefd34af811724f59b4cd4dedabf860N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
eaefd34af811724f59b4cd4dedabf860N.exe
Resource
win10v2004-20240802-en
General
-
Target
eaefd34af811724f59b4cd4dedabf860N.exe
-
Size
134KB
-
MD5
eaefd34af811724f59b4cd4dedabf860
-
SHA1
e1e42acd938f0b9e167526de1c953a29b32785a1
-
SHA256
147d2ae996d8ba2bc3ebb3d22c11933d48e4e66177c94deb816b36a158c8cebd
-
SHA512
9af0788ade0320679bb3f58ed065b97abe89b711983af491249184a79ac174a19a61fdf9158578663011d7b94f12e5fe1fcef9234a77e8b8da5d011e76d889cc
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qc:riAyLN9aa+9U2rW1ip6pr2At7NZuQc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 eaefd34af811724f59b4cd4dedabf860N.exe -
resource yara_rule behavioral1/memory/1320-0-0x00000000000D0000-0x00000000000F8000-memory.dmp upx behavioral1/files/0x0008000000015d8b-2.dat upx behavioral1/memory/2532-6-0x0000000000390000-0x00000000003B8000-memory.dmp upx behavioral1/memory/1320-7-0x00000000000D0000-0x00000000000F8000-memory.dmp upx behavioral1/memory/2532-9-0x0000000000390000-0x00000000003B8000-memory.dmp upx behavioral1/memory/1320-10-0x00000000000D0000-0x00000000000F8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" eaefd34af811724f59b4cd4dedabf860N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaefd34af811724f59b4cd4dedabf860N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2532 1320 eaefd34af811724f59b4cd4dedabf860N.exe 30 PID 1320 wrote to memory of 2532 1320 eaefd34af811724f59b4cd4dedabf860N.exe 30 PID 1320 wrote to memory of 2532 1320 eaefd34af811724f59b4cd4dedabf860N.exe 30 PID 1320 wrote to memory of 2532 1320 eaefd34af811724f59b4cd4dedabf860N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaefd34af811724f59b4cd4dedabf860N.exe"C:\Users\Admin\AppData\Local\Temp\eaefd34af811724f59b4cd4dedabf860N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD59a4c6ca317103346c3a2c75b8f88d998
SHA18ba8c17d6fc03be816d4c4474f0f7e1abc1bdabc
SHA2569fa143af4fcabea7b8001b5785563dc689dca6e8fda9f835ada0fb12f845c354
SHA512064554da374e5df3387b643ab11436cc4f2096b95e6a84b0c106e9bbe2caed7299797b2cf1062c7e8bcc6bace2fcce0df917671c30420e6656111f03926a5052