Resubmissions

06-07-2024 19:37

240706-yb36ra1epn 7

06-07-2024 19:36

240706-yba5zatdqf 3

06-07-2024 19:32

240706-x8yf4a1ekp 7

06-07-2024 19:29

240706-x7anmstdld 3

06-07-2024 19:21

240706-x2tjka1dml 6

Analysis

  • max time kernel
    101s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 19:29

General

  • Target

    WaveInstaller (1).exe

  • Size

    1.5MB

  • MD5

    c822ab5332b11c9185765b157d0b6e17

  • SHA1

    7fe909d73a24ddd87171896079cceb8b03663ad4

  • SHA256

    344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

  • SHA512

    a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

  • SSDEEP

    24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe
    "C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 2304
      2⤵
      • Program crash
      PID:860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4484 -ip 4484
    1⤵
      PID:3356
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3624
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:2572
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 604 800 812 8192 808 796
          2⤵
          • Modifies data under HKEY_USERS
          PID:4208

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/856-9-0x0000013B2A8F0000-0x0000013B2A900000-memory.dmp

        Filesize

        64KB

      • memory/856-41-0x0000013B2EEE0000-0x0000013B2EEE8000-memory.dmp

        Filesize

        32KB

      • memory/856-25-0x0000013B2A9F0000-0x0000013B2AA00000-memory.dmp

        Filesize

        64KB

      • memory/4208-53-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-73-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-68-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-69-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-70-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-71-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-54-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-72-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-56-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-45-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-46-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-47-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-48-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-49-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-50-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-51-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-52-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-58-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-74-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-75-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-67-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-57-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-60-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-59-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-55-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-62-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-61-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-63-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-64-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-65-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4208-66-0x0000018938950000-0x0000018938960000-memory.dmp

        Filesize

        64KB

      • memory/4484-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

        Filesize

        4KB

      • memory/4484-4-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/4484-3-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/4484-1-0x0000000000B80000-0x0000000000D12000-memory.dmp

        Filesize

        1.6MB

      • memory/4484-2-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/4484-8-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/4484-7-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

        Filesize

        4KB

      • memory/4484-5-0x0000000009F50000-0x0000000009F88000-memory.dmp

        Filesize

        224KB

      • memory/4484-6-0x0000000009F20000-0x0000000009F2E000-memory.dmp

        Filesize

        56KB