Overview
overview
6Static
static
3Wave Spoof...er.bat
windows7-x64
1Wave Spoof...er.bat
windows10-2004-x64
6Wave Spoof...er.cmd
windows7-x64
1Wave Spoof...er.cmd
windows10-2004-x64
1Wave Spoof...er.bat
windows7-x64
1Wave Spoof...er.bat
windows10-2004-x64
1Wave Spoof...er.exe
windows7-x64
1Wave Spoof...er.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
Wave Spoofer/Drive_Remover.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Wave Spoofer/Drive_Remover.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Wave Spoofer/HWID-Checker.cmd
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Wave Spoofer/HWID-Checker.cmd
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Wave Spoofer/Permament_Mac_Changer.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Wave Spoofer/Permament_Mac_Changer.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Wave Spoofer/WaveSpoofer.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Wave Spoofer/WaveSpoofer.exe
Resource
win10v2004-20240419-en
General
-
Target
Wave Spoofer/Drive_Remover.bat
-
Size
13KB
-
MD5
0c345568b15f4163d3955388cfa615f4
-
SHA1
069c7b499e8f68fb90d316d6114440ef762507d6
-
SHA256
28dc4e8c24c16af0910f3542ec8ae12376e668e45ba310a7f25c87ab4bfb89e8
-
SHA512
d4619bbb7bfeccf0bb3ea7259fec6a8324aadd544017ee0df0390339d112fd0ced6707d91fc5036faf2c4cbcc9326c4ba57befbbdf909c2306c109acdba6c543
-
SSDEEP
192:dIo4yR9Y9A/r1/kMUnNLyCYSvGOqHQ28lh9YDpqWkSyt1ninmdKgZ:3xR9hjF/UnECROBClh9YDpDkSy3inlo
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK powershell.exe Key opened \REGISTRY\MACHINE\System\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\System\ControlSet001\Enum\SCSI\Disk&Ven_Dell&Prod_THINAIR_DISK powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1856 1928 cmd.exe 29 PID 1928 wrote to memory of 1856 1928 cmd.exe 29 PID 1928 wrote to memory of 1856 1928 cmd.exe 29 PID 1856 wrote to memory of 2264 1856 net.exe 30 PID 1856 wrote to memory of 2264 1856 net.exe 30 PID 1856 wrote to memory of 2264 1856 net.exe 30 PID 1928 wrote to memory of 2956 1928 cmd.exe 31 PID 1928 wrote to memory of 2956 1928 cmd.exe 31 PID 1928 wrote to memory of 2956 1928 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Wave Spoofer\Drive_Remover.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\net.exeNET FILE2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 FILE3⤵PID:2264
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell /nologo /noprofile /command "&{[ScriptBlock]::Create((cat """C:\Users\Admin\AppData\Local\Temp\Wave Spoofer\Drive_Remover.bat""") -join [Char[]]10).Invoke(@(&{$args}))}"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-