Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 13:44
Behavioral task
behavioral1
Sample
Wave.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
Wave.exe
-
Size
6.0MB
-
MD5
982565bc2a84320f9c1d8f1acceb8483
-
SHA1
5dafdd8eacf1ddd854393ff81cbb39596fb7c043
-
SHA256
714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64
-
SHA512
ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005
-
SSDEEP
196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2852 Wave.exe -
resource yara_rule behavioral1/files/0x000600000001707c-21.dat upx behavioral1/memory/2852-23-0x000007FEF6130000-0x000007FEF659E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2852 2796 Wave.exe 31 PID 2796 wrote to memory of 2852 2796 Wave.exe 31 PID 2796 wrote to memory of 2852 2796 Wave.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee