Resubmissions

23-10-2024 15:23

241023-ssksvaxbld 3

04-09-2024 13:53

240904-q65ztssflb 10

Analysis

  • max time kernel
    1363s
  • max time network
    1154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 15:23

General

  • Target

    WaveKeyGen/obj/Debug/net8.0/WaveKeyGen.csproj.CoreCompileInputs.cache

  • Size

    66B

  • MD5

    58e8bb011399a522f9a7ebee7a2ad16e

  • SHA1

    ae92baed3bef142d6d48c3d552d47126a9cc05d4

  • SHA256

    9d76ef2da1296c1a5a1e2cc81cd141e1717264bdd2ffe37f92e95d54b447ff5e

  • SHA512

    acaa31d672274ce072a0f864dbca24aebdee3c8b39bde66fdd38efef92036b9f4d196bfdab259d6a5125d6d00e4a4793dd58cc95a0f25596049bbd4f8a215a55

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\WaveKeyGen\obj\Debug\net8.0\WaveKeyGen.csproj.CoreCompileInputs.cache
    1⤵
    • Modifies registry class
    PID:4304
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads