Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe
Resource
win10v2004-20241007-en
General
-
Target
2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe
-
Size
94KB
-
MD5
f7b1174f0cb015ab42c269184ef42870
-
SHA1
73775d02dab9973db6d191a031817f8caa37880d
-
SHA256
2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982
-
SHA512
b54c88e7821480313306dcc497409e2619aadd7529d412bc928284842c7880e49f4742fd540fbd3588515b7dcd8cfba44a2882de5780529475bc81564c1ffd68
-
SSDEEP
1536:tF0AJELoJHG9qa+oa33KJJzAKWYr0v7iJSzIRXKTzRZICrWaGZh7m:tiAyLN9qa+oEGrWViJSzIR6JJrWNZo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1448 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2692 1448 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe 30 PID 1448 wrote to memory of 2692 1448 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe 30 PID 1448 wrote to memory of 2692 1448 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe 30 PID 1448 wrote to memory of 2692 1448 2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe"C:\Users\Admin\AppData\Local\Temp\2ff45f0918388e6033cec38e170d5b4a04532f99a39ff0fa9438cbe462e47982N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5978150a9c8f6ef3348ebef8ac5477a9d
SHA165fa3722fd5c6dffd41857fa117c626cd1689bfa
SHA2564252925c336488c758fa2d6c310a8c339a5361d5499f076870719c54630f7b1e
SHA5129defd572d6d02d9abc113f72a9e50a664371a82b81a5251f4601e3bea53e894bf0791819b3c0ebee49439418127a200951771cf2e3e14213f24eb57f7a0c4237