Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:40
Behavioral task
behavioral1
Sample
7f9b962da71f235f8487e00138d724f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f9b962da71f235f8487e00138d724f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7f9b962da71f235f8487e00138d724f0N.exe
-
Size
134KB
-
MD5
7f9b962da71f235f8487e00138d724f0
-
SHA1
704f08070d074c1cafed4f38bf24801b50aa3e0e
-
SHA256
a72ee360d0404ea94002ff92d5ba4f8cadedb6ff8b9c012825abc70240d0aeb2
-
SHA512
6d2a47e71536c5d40ecef1f3c5d73cd32cee58c7df511799d3820192877422d38887778d4b90a1d012e9bec58f9d26c3e4784bfa4621e89f1c6d72c5cccc6d04
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qt:riAyLN9aa+9U2rW1ip6pr2At7NZuQt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2524 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 7f9b962da71f235f8487e00138d724f0N.exe -
resource yara_rule behavioral1/memory/1968-0-0x00000000008F0000-0x0000000000918000-memory.dmp upx behavioral1/files/0x000700000001945b-2.dat upx behavioral1/memory/2524-7-0x00000000003A0000-0x00000000003C8000-memory.dmp upx behavioral1/memory/1968-8-0x00000000008F0000-0x0000000000918000-memory.dmp upx behavioral1/memory/2524-9-0x00000000003A0000-0x00000000003C8000-memory.dmp upx behavioral1/memory/1968-10-0x00000000008F0000-0x0000000000918000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 7f9b962da71f235f8487e00138d724f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f9b962da71f235f8487e00138d724f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2524 1968 7f9b962da71f235f8487e00138d724f0N.exe 30 PID 1968 wrote to memory of 2524 1968 7f9b962da71f235f8487e00138d724f0N.exe 30 PID 1968 wrote to memory of 2524 1968 7f9b962da71f235f8487e00138d724f0N.exe 30 PID 1968 wrote to memory of 2524 1968 7f9b962da71f235f8487e00138d724f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9b962da71f235f8487e00138d724f0N.exe"C:\Users\Admin\AppData\Local\Temp\7f9b962da71f235f8487e00138d724f0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5e4a405b5906b21dd02aa8a821f357f45
SHA1fb6418794b4ed506651926e02689d16d33223aa5
SHA25636c001a36a26651c9d34df529a6dba4aae5991e41baa8ff216fb17d4d2c81a36
SHA5122972dbeb9fd5a2f379be2b71ca1221df813d8783200967f2f1e333049bb421579bb8d7dffd3dd3d96c68fab2ae9b0ec0b1dbeada839bc6b4925a048f897079ad