Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 07:40
Behavioral task
behavioral1
Sample
7f9b962da71f235f8487e00138d724f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f9b962da71f235f8487e00138d724f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7f9b962da71f235f8487e00138d724f0N.exe
-
Size
134KB
-
MD5
7f9b962da71f235f8487e00138d724f0
-
SHA1
704f08070d074c1cafed4f38bf24801b50aa3e0e
-
SHA256
a72ee360d0404ea94002ff92d5ba4f8cadedb6ff8b9c012825abc70240d0aeb2
-
SHA512
6d2a47e71536c5d40ecef1f3c5d73cd32cee58c7df511799d3820192877422d38887778d4b90a1d012e9bec58f9d26c3e4784bfa4621e89f1c6d72c5cccc6d04
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qt:riAyLN9aa+9U2rW1ip6pr2At7NZuQt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1488 WwanSvc.exe -
resource yara_rule behavioral2/memory/1988-0-0x0000000000550000-0x0000000000578000-memory.dmp upx behavioral2/memory/1988-6-0x0000000000550000-0x0000000000578000-memory.dmp upx behavioral2/files/0x0008000000023584-5.dat upx behavioral2/memory/1488-4-0x0000000000520000-0x0000000000548000-memory.dmp upx behavioral2/memory/1488-7-0x0000000000520000-0x0000000000548000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 7f9b962da71f235f8487e00138d724f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f9b962da71f235f8487e00138d724f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1488 1988 7f9b962da71f235f8487e00138d724f0N.exe 90 PID 1988 wrote to memory of 1488 1988 7f9b962da71f235f8487e00138d724f0N.exe 90 PID 1988 wrote to memory of 1488 1988 7f9b962da71f235f8487e00138d724f0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9b962da71f235f8487e00138d724f0N.exe"C:\Users\Admin\AppData\Local\Temp\7f9b962da71f235f8487e00138d724f0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4508,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5eae722901c4995908321bcc09fc9427f
SHA1a09061b2f6c4cb0f6b4671814df9e0ef1020a0c3
SHA2565cc4b945b07db9f7ff63cd9dd41f95eb360696c437cf9f8d3ceef6fb2b9652f8
SHA512de36677fac9cf7d2110f50ac1ca6a9ec51828be57e281e492d3bb01a85a357ef244827fe5cb37189b1aaae86829eb8f763cf4901f776f8523f4d9377879ba45f