Resubmissions

06-07-2024 19:37

240706-yb36ra1epn 7

06-07-2024 19:36

240706-yba5zatdqf 3

06-07-2024 19:32

240706-x8yf4a1ekp 7

06-07-2024 19:29

240706-x7anmstdld 3

06-07-2024 19:21

240706-x2tjka1dml 6

Analysis

  • max time kernel
    137s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-07-2024 19:21

General

  • Target

    WaveInstaller (1).exe

  • Size

    1.5MB

  • MD5

    c822ab5332b11c9185765b157d0b6e17

  • SHA1

    7fe909d73a24ddd87171896079cceb8b03663ad4

  • SHA256

    344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

  • SHA512

    a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

  • SSDEEP

    24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe
    "C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3400

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
    Filesize

    949KB

    MD5

    8fb51b92d496c6765f7ba44e6d4a8990

    SHA1

    d3e5a8465622cd5adae05babeb7e34b2b5c777d7

    SHA256

    ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394

    SHA512

    20de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6

  • memory/3400-8-0x0000000074E50000-0x0000000075601000-memory.dmp
    Filesize

    7.7MB

  • memory/3400-15-0x000000000BD90000-0x000000000BE26000-memory.dmp
    Filesize

    600KB

  • memory/3400-3-0x0000000074E50000-0x0000000075601000-memory.dmp
    Filesize

    7.7MB

  • memory/3400-4-0x0000000009BB0000-0x0000000009BE8000-memory.dmp
    Filesize

    224KB

  • memory/3400-5-0x0000000009B80000-0x0000000009B8E000-memory.dmp
    Filesize

    56KB

  • memory/3400-6-0x0000000074E5E000-0x0000000074E5F000-memory.dmp
    Filesize

    4KB

  • memory/3400-2-0x0000000074E50000-0x0000000075601000-memory.dmp
    Filesize

    7.7MB

  • memory/3400-0-0x0000000074E5E000-0x0000000074E5F000-memory.dmp
    Filesize

    4KB

  • memory/3400-7-0x0000000074E50000-0x0000000075601000-memory.dmp
    Filesize

    7.7MB

  • memory/3400-16-0x000000000B7F0000-0x000000000B816000-memory.dmp
    Filesize

    152KB

  • memory/3400-17-0x000000000B820000-0x000000000B828000-memory.dmp
    Filesize

    32KB

  • memory/3400-19-0x000000000C080000-0x000000000C0F2000-memory.dmp
    Filesize

    456KB

  • memory/3400-21-0x000000000BB50000-0x000000000BB5A000-memory.dmp
    Filesize

    40KB

  • memory/3400-20-0x000000000B840000-0x000000000B84A000-memory.dmp
    Filesize

    40KB

  • memory/3400-1-0x0000000000790000-0x0000000000922000-memory.dmp
    Filesize

    1.6MB