Resubmissions
09/04/2024, 01:44
240409-b5wx7sae77 309/04/2024, 01:35
240409-bztwnaac56 609/04/2024, 01:32
240409-bxy3laab66 3Analysis
-
max time kernel
111s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
Wave.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Wave.exe
Resource
win10v2004-20240226-en
General
-
Target
Wave.exe
-
Size
7.0MB
-
MD5
a8bd4a6b2f1d00928e61870a5688c13d
-
SHA1
e17646d5279534f2e3eb0e0cfc8b6c536bc0c095
-
SHA256
2c51f67e236cf95e2d51df4178699da09869ab077924cff0b3df1c512878ef2f
-
SHA512
6b5175beea4071668c87b16af3177bbb2cbaff6b28909dc1e09ad5b16b449c62d6adc372a0094de627fe9835f0c474d16708c3f698355ba1664bf321fa19f5fb
-
SSDEEP
98304:37//YITF8r2n8TevxbFKVlXk34tZ+t4+aNG5Lhd+2G4Op0cN+hmdYkvsFLL:37//1xBVqvG5dQ2m0cN+hmdYkvsFLL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571007543558660" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4484 3192 chrome.exe 106 PID 3192 wrote to memory of 4484 3192 chrome.exe 106 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1584 3192 chrome.exe 107 PID 3192 wrote to memory of 1492 3192 chrome.exe 108 PID 3192 wrote to memory of 1492 3192 chrome.exe 108 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109 PID 3192 wrote to memory of 4756 3192 chrome.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wave.exe"C:\Users\Admin\AppData\Local\Temp\Wave.exe"1⤵PID:1888
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3636
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9ef5b9758,0x7ff9ef5b9768,0x7ff9ef5b97782⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:22⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4720 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4832 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4968 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5124 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5164 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=1828,i,6773718967371966853,17111936725495078102,131072 /prefetch:82⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:4816
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff655da7688,0x7ff655da7698,0x7ff655da76a83⤵PID:3040
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371B
MD5729e67f049e33dd5bb2bd283d4a3c6a1
SHA1085ccc1725b24f0264ca09eb7d5c2db4b12cc40d
SHA256f1d52b636eefd1d15fbb32d44cc6e2c7c28ec1cdfce9b1fc60906287b47edd45
SHA5121976a9ceb4a83c0e934958d95ef6eed5a0e245c4a48f94be8aa813cd08f48ef95d53120e65f75d54154df94ab8ac058855c44def80a96ac5fe7542b0526b1c3a
-
Filesize
6KB
MD5d024317c009de7e12870cf5d5a45e067
SHA12de8a7155a16a6f9b02ba3da512e023acb9b5a7f
SHA256d9ad8716a383b28d1f61c1c3be930109361a29964321d7204592672f417a59c6
SHA5124f3f9caa0ce5c4016b331cc97c7ff23c3b925581f1bfb2d8c3d2b4b22227c792e870182671e8ee8904a59be0707a3dac9c8b0b02bd7737f8f2eaa6be65f1d956
-
Filesize
15KB
MD5be45af8f1f4600000a3cf298203f9387
SHA1cb5bcbcb8eee5d23b5ee4c84e95675a934895085
SHA256175981a1c775a1c86276ffa0cf21b8d5e4b95c030b0b1d4a8aa974a6febe5081
SHA51281519b887ce492f8c51eef09314d2835c16eabd786659bb18d90c1a457c0db3467d3bc99bafed829b4e321433c7e0f957cfe13a32c5bbed42b4c958eebe89f9d
-
Filesize
260KB
MD5db12b07c92b7eda618691542e0fa0811
SHA1c23cd8edce8242693e1f73332c69c18933585a63
SHA2561e4cbd6dea33857ba669cbf3864fc94f6619119d9a890a5d68733e4e814edf3e
SHA5120273edab7f4dae3bb9f31707c2337f0387b6c8ded28c2d6126cf5f342da64d451f94638f775723e7bb1e8ca60ad0b467e3a9d9c6be6dd5c1c252eb11a55e0b45
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd