Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 22:38
General
-
Target
Wave.exe
-
Size
274KB
-
MD5
09a0ec3acb93c6d59932525a2e497398
-
SHA1
e4ea0facd84f072785f008fb1f6cfcfca914e872
-
SHA256
ff70fe25d30b5252ffc9e083187f1091c2d18e7b33f9c4bf8abd87906a252cc7
-
SHA512
b80374b596d2bcfb9b0d07daa9712e095f67b7ce0140a8a5567a5906a64f819c3f46806e95fa60d3f6170e444a25ff4005d45fad702c7addcddba933843d19e7
-
SSDEEP
6144:0f+BLtABPDMZZzIlzcwKUfmBnxafTy8lI1D0NZv:jZOnKUfmBXx1DUv
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1234062798355431434/JlB7QAXe-wioFkoPtDp2B4GwdSHNOtJbalU_YUgkqCeZlhZBcGaQKTH272rVMLbnp5dM
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Wave.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Wave.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4732 Wave.exe 4732 Wave.exe 4732 Wave.exe 4732 Wave.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4732 Wave.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bec4e961d25604736832c09090a5f336
SHA1c3a169fb84c6d7075d9c23ac3f5a3baca8521458
SHA2565caa98a4e86a82635983c69cf59ab7d79b4577eb47738d5b967eb4bec9ca5eef
SHA512f5d9228d2f5482e7aa614e030fac2f543d24b19afc32e0d3ad57720e18dbbf1914fc19b5601ebddfc747c766074b8c4da1495caa0fb478b83a5b2edca5f06d4f