Analysis
-
max time kernel
82s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller (1).exe
Resource
win10v2004-20240704-en
General
-
Target
WaveInstaller (1).exe
-
Size
1.5MB
-
MD5
c822ab5332b11c9185765b157d0b6e17
-
SHA1
7fe909d73a24ddd87171896079cceb8b03663ad4
-
SHA256
344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a
-
SHA512
a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d
-
SSDEEP
24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WaveInstaller (1).exeWaveBootstrapper.exeWaveWindows.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation WaveInstaller (1).exe Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation WaveBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation WaveWindows.exe -
Executes dropped EXE 3 IoCs
Processes:
WaveBootstrapper.exeWaveWindows.exenode.exepid process 1200 WaveBootstrapper.exe 2912 WaveWindows.exe 532 node.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
WaveWindows.exepid process 2912 WaveWindows.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WaveInstaller (1).exeWaveBootstrapper.exeWaveWindows.exedescription pid process Token: SeDebugPrivilege 4056 WaveInstaller (1).exe Token: SeDebugPrivilege 1200 WaveBootstrapper.exe Token: SeDebugPrivilege 2912 WaveWindows.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WaveInstaller (1).exeWaveWindows.exepid process 4056 WaveInstaller (1).exe 2912 WaveWindows.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WaveInstaller (1).exeWaveBootstrapper.exeWaveWindows.exedescription pid process target process PID 4056 wrote to memory of 1200 4056 WaveInstaller (1).exe WaveBootstrapper.exe PID 4056 wrote to memory of 1200 4056 WaveInstaller (1).exe WaveBootstrapper.exe PID 4056 wrote to memory of 1200 4056 WaveInstaller (1).exe WaveBootstrapper.exe PID 1200 wrote to memory of 2912 1200 WaveBootstrapper.exe WaveWindows.exe PID 1200 wrote to memory of 2912 1200 WaveBootstrapper.exe WaveWindows.exe PID 1200 wrote to memory of 2912 1200 WaveBootstrapper.exe WaveWindows.exe PID 2912 wrote to memory of 532 2912 WaveWindows.exe node.exe PID 2912 wrote to memory of 532 2912 WaveWindows.exe node.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=29124⤵
- Executes dropped EXE
PID:532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4032,i,3409420486566309625,12100452682816721435,262144 --variations-seed-version --mojo-platform-channel-handle=3812 /prefetch:81⤵PID:1440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD56b1cad741d0b6374435f7e1faa93b5e7
SHA17b1957e63c10f4422421245e4dc64074455fd62a
SHA2566f17add2a8c8c2d9f592adb65d88e08558e25c15cedd82e3f013c8146b5d840f
SHA512a662fc83536eff797b8d59e2fb4a2fb7cd903be8fc4137de8470b341312534326383bb3af58991628f15f93e3bdd57621622d9d9b634fb5e6e03d4aa06977253
-
Filesize
949KB
MD58fb51b92d496c6765f7ba44e6d4a8990
SHA1d3e5a8465622cd5adae05babeb7e34b2b5c777d7
SHA256ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394
SHA51220de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6
-
Filesize
8.0MB
MD5c0563fdf381a1f1274c8b2729254f19c
SHA1f053b238515f9b8cc4f763f8bc6bf321f160a499
SHA256b625a539e7d439938f6864564cbcf00a610e9f29415cde7b1ebac45318cdc371
SHA512c8abf1aabd44aff41472d2bb595c5a6c5e0c4b5dd9f2809d9ad625431fc6d12b8122bbf394e0cf0e4a71998136791942142d4a461c477981601e3c0dfd513bb5