Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
c6c8947f5cb8b647a770d8e214273eb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6c8947f5cb8b647a770d8e214273eb9.exe
Resource
win10v2004-20240226-en
General
-
Target
c6c8947f5cb8b647a770d8e214273eb9.exe
-
Size
14.8MB
-
MD5
c6c8947f5cb8b647a770d8e214273eb9
-
SHA1
a43aa4b8563650131ac94e624d48b67024255251
-
SHA256
2f4ba1c8e5197a8d4a991d35055ff6bab653f5bf4239262883f482661028b4d8
-
SHA512
13720d72fa188da66a3d18c3e90b5b2e02de4024fa49a6926111e8a83240345760c33acf083add6585e2b1ea1866b1ab67c6cb2d61445fbb4e7ed9243a9da2aa
-
SSDEEP
98304:EcKHfSAHfS+HfSAHfKSAHVHfS+HfSAHfK6:EY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3408 waei.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3408 waei.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3408 waei.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3408 waei.exe 3408 waei.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3408 1608 c6c8947f5cb8b647a770d8e214273eb9.exe 88 PID 1608 wrote to memory of 3408 1608 c6c8947f5cb8b647a770d8e214273eb9.exe 88 PID 1608 wrote to memory of 3408 1608 c6c8947f5cb8b647a770d8e214273eb9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c8947f5cb8b647a770d8e214273eb9.exe"C:\Users\Admin\AppData\Local\Temp\c6c8947f5cb8b647a770d8e214273eb9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\waei.exeC:\Users\Admin\AppData\Local\Temp\waei.exe -run C:\Users\Admin\AppData\Local\Temp\c6c8947f5cb8b647a770d8e214273eb9.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5293f30ad02a2955f87acb52f9933d9c9
SHA1ef77823211151cb3b97e208b63ca9fa867e002f7
SHA2564b8ebfc9959dc79f44403604cb7b71923e95503d4a2f9c79042b58f2b576fe04
SHA512e7d4e267958cb61ba1c6e87bff1091714ffa8cba8f3d0706cfb7d46c534945d9c5e158b815fc76ba19ece174f30f35a909b8d4cefcbc08f4ab33f0683e06124a
-
Filesize
832KB
MD52e3659c1cc833fc3cabc3f0b7d131296
SHA181d2d028039e32dc1ee5b9df46aa0c62e119ca09
SHA25632782b4d4ac0b3615d7d85e6c0c729661309a3dd2bd25d01a89f9d0adfe4e558
SHA512b758f2d506637b26527ff11e0224ff76d34858ce321f91c80061b6f025899e2d6d8d7570d1fbd8f5c9764b460d62c5703f04361157e10886e599e9cd45fbe4a3