Analysis
-
max time kernel
485s -
max time network
486s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 01:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2438.mediafire.com/79evbux4lshgIBRxRTOuHtBZgYut0j38PaFcJtBp1l9oMzFjuKc1K3LCUySmzkabqBAfcGNzhK4SaWfJQ0C6qB7ZQEKw0w8QDImRx6rKhT_bN67PExGY_fTD8QhWaBnro0pPE3NS0nYsdOp1fAedhL51eQYxPsR-FipXcUtKyktfkjxH/lqlncwwnvq7n1rq/WaveTrial.rar
Resource
win10v2004-20240226-en
General
-
Target
https://download2438.mediafire.com/79evbux4lshgIBRxRTOuHtBZgYut0j38PaFcJtBp1l9oMzFjuKc1K3LCUySmzkabqBAfcGNzhK4SaWfJQ0C6qB7ZQEKw0w8QDImRx6rKhT_bN67PExGY_fTD8QhWaBnro0pPE3NS0nYsdOp1fAedhL51eQYxPsR-FipXcUtKyktfkjxH/lqlncwwnvq7n1rq/WaveTrial.rar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571008259981841" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1624 chrome.exe 1624 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe Token: SeShutdownPrivilege 1624 chrome.exe Token: SeCreatePagefilePrivilege 1624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe 1624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 4036 1624 chrome.exe 88 PID 1624 wrote to memory of 4036 1624 chrome.exe 88 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 3868 1624 chrome.exe 91 PID 1624 wrote to memory of 5008 1624 chrome.exe 92 PID 1624 wrote to memory of 5008 1624 chrome.exe 92 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93 PID 1624 wrote to memory of 1348 1624 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://download2438.mediafire.com/79evbux4lshgIBRxRTOuHtBZgYut0j38PaFcJtBp1l9oMzFjuKc1K3LCUySmzkabqBAfcGNzhK4SaWfJQ0C6qB7ZQEKw0w8QDImRx6rKhT_bN67PExGY_fTD8QhWaBnro0pPE3NS0nYsdOp1fAedhL51eQYxPsR-FipXcUtKyktfkjxH/lqlncwwnvq7n1rq/WaveTrial.rar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffc7ea79758,0x7ffc7ea79768,0x7ffc7ea797782⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:22⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5484 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:12⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1880,i,16166047329086062456,1674350770274752441,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e5cca8fdd951ff8687c87d68f1ec07b6
SHA171804682284500d7e6500db37b6e92cabdb521da
SHA2566782ff8570e341d8a2272541be0fc97defac7bceaa05e7e4536ce72e474da1a4
SHA5123e2d85820ed73a9156647d196b1bd127cc6313b2b45cf5488ba07329ecdb5caabd4018dccb4d60aa16f7d0b95f5a6f8ad38f848dae7edb5575c8ed78ab877eb4
-
Filesize
7KB
MD59e5fdf45529766937d0f5b02de559ea0
SHA122753feb504deb7161f8cd431d4012e13862aff8
SHA256688a096770f31b69572d687707961261ef650dc760d63bc388fe25299371e803
SHA5127a9c0d9177f9ced406b5e4a7765f6e3e85777581b3d65a75aaa8977c6fe920dfe788332079b5a57087ba11e04fcb1308372970e7c3f58a1ff909838440b0f886
-
Filesize
8KB
MD50122a4325cb7fdedf6cdf0e80661707a
SHA1def91e43155c05e159035bfb4487443c05571fb5
SHA2560d0054905320268e335b0c83edef4a4259474ca61f57129a9ea4d9d410a6dac7
SHA5120e1e722f931ce9b845ce582b501ad0a0d7c7f22cf17393179fb098bfca4780b1c437359ab5eaaa08c45c65a7f999012d91770cbd5bb7871cbed78aafaaafa632
-
Filesize
1KB
MD5f68d150d0410317d57cf726bdebccbde
SHA10f0a22fa1c59415cb33231e0bb49f7f26ae0be08
SHA2562b7d27b2476115fa151473defd82ec0d3a57dec41af99ea4ef6d4bade1560b5a
SHA512d14408474980ab92a63e0275bdfb2477661bfcdb81e2836d7722a48d3e0c40f33869d87a32f22904efdbec383384423ed3b55c58e20af8162f39d61f76bc2cd8
-
Filesize
1KB
MD541f1eb2826107e1f84f0eb413acc7dcc
SHA165c8effe2407e34cf5594210ba6b5b906670ca64
SHA256a04d6758359e58e9bfc3da1d9c89fd70cef7c91298f27354fb8fed5abfd73dd1
SHA512cebf740dafe2cc908130a922498618c627d78f5a7d6c2ef66056546921cb4743f6b230beede43b3eef0b074d153d884b525cbf83566ff4950bfd66f6841b9cdd
-
Filesize
6KB
MD5b6d0292e196993109945d86780e0b84c
SHA1276bba9235c257d796206cf705d0f1fb6ae8ee32
SHA2560ec1fd9f4fa62823e6d5fde4e862dfc7ce26e100734f5b1db0b2b18cc42e5f31
SHA5121a5a5a5c63b126a92423e056843cc526b3edefcd24967b2c7ee05a5368f636708e5b4a26af715dc4f6b18c8faa858d6844bc4d29be1162e6007b4646b370aed1
-
Filesize
128KB
MD50a08013bef88eac69edaef434f4b26a0
SHA1220a75d44a085b0ad497f7895424e5d184f086df
SHA25627793aeef8f96ee62f1ad3bc198d1c4e3da7af4a3b6f47b5c7767018afe5bb17
SHA512000ef7e09a315084f5d5968c67a1bbb3be1fcc9ecc504b09a115fda4839391ac4f6a55383f556afc13633edbc9c8dc3a04f1dd6d20b1bb0603d48b2a119fda1f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd