Overview
overview
8Static
static
3Weave Manager.exe
windows7-x64
8Weave Manager.exe
windows10-2004-x64
7$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...d3.exe
windows7-x64
4$PLUGINSDI...d3.exe
windows10-2004-x64
4$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
Weave Manager.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Weave Manager.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/idman641build3.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/idman641build3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
General
-
Target
Weave Manager.exe
-
Size
10.9MB
-
MD5
637ff19f62515e60fe8f41e942dadd2f
-
SHA1
8b76e47821cf352a9e237090b3d000049b4ec9d0
-
SHA256
1c6d72f0ad77870033b27ce05dbd17c76932a161003792daafcc5a28a2e084e0
-
SHA512
221217ab065aadd967e1e5c81f863fdcc5f118074640bf94712e709743e6e688dab9db32a161e395ee11bfd030cfa122506956f06bf3d6fe12dbd6ea24969d71
-
SSDEEP
196608:DSiYq5pjxAwA/THcNwTAlAWzN+PpC6UQJlU/rnsfx+KNZeYez8aQHD2peixk:DDTtxAwAb8NwT1I+Z7inI+sZh/HKpRk
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2692 go.exe -
Loads dropped DLL 18 IoCs
pid Process 2436 Weave Manager.exe 2436 Weave Manager.exe 2436 Weave Manager.exe 2436 Weave Manager.exe 2436 Weave Manager.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe 2692 go.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2436 Weave Manager.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2692 2436 Weave Manager.exe 32 PID 2436 wrote to memory of 2692 2436 Weave Manager.exe 32 PID 2436 wrote to memory of 2692 2436 Weave Manager.exe 32 PID 2436 wrote to memory of 2692 2436 Weave Manager.exe 32 PID 2692 wrote to memory of 3024 2692 go.exe 33 PID 2692 wrote to memory of 3024 2692 go.exe 33 PID 2692 wrote to memory of 3024 2692 go.exe 33 PID 2692 wrote to memory of 3024 2692 go.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Weave Manager.exe"C:\Users\Admin\AppData\Local\Temp\Weave Manager.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\nsi1601.tmp\go.exe"C:\Users\Admin\AppData\Local\Temp\nsi1601.tmp\go.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\nse5BD7.tmp\file.bat3⤵PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5b0d76e6a973c4973239b55f33dc23c89
SHA179c8744eb1f42297c0d49ecc929a16e766ca4666
SHA256e033c09835c478b8e026a5dc94d9ff3a6d6dc763835717bb22a6dd034a13e7bd
SHA5121c1f4bc29801773a04460278782dcc01f93edbd51157dd14fa6ae519f1a12154b8a5cae58679263ac933241e596e92152e4943342bd5dfe42d3e2088f7cdfe38
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
9KB
MD51d8f01a83ddd259bc339902c1d33c8f1
SHA19f7806af462c94c39e2ec6cc9c7ad05c44eba04e
SHA2564b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed
SHA51228bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567