General
-
Target
WaveInstaller___40_1__41_.zip
-
Size
1.3MB
-
Sample
240709-2yecpasgma
-
MD5
a1f9a6535ae97d467209bb5ce4815b2a
-
SHA1
8a1f6ebba01314ec292aedf6e1c3ba1f95a109fe
-
SHA256
90eef2098cfec84d5ea5356f6409e81ec2483e64608b2da5a4f164aaa2e416df
-
SHA512
7e3f91f42804f86de1d8fd2636e3dd45cf6bc837db6bc3ded231e46c7a0d293ee1e457653fc4f1b10435ed29830795cb4705eb38f3f1882e9fdfa2cbe59124ea
-
SSDEEP
24576:g5SV/z8py4whNMUP3iWHBnIk0I4pRsJG7xRGmFej9m3Y5jZXQHS:DJ8p3sN5/i4KD0gMmimCZF
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller___40_1__41_.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WaveInstaller___40_1__41_.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
WaveInstaller (1).exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
WaveInstaller (1).exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
WaveInstaller___40_1__41_.zip
-
Size
1.3MB
-
MD5
a1f9a6535ae97d467209bb5ce4815b2a
-
SHA1
8a1f6ebba01314ec292aedf6e1c3ba1f95a109fe
-
SHA256
90eef2098cfec84d5ea5356f6409e81ec2483e64608b2da5a4f164aaa2e416df
-
SHA512
7e3f91f42804f86de1d8fd2636e3dd45cf6bc837db6bc3ded231e46c7a0d293ee1e457653fc4f1b10435ed29830795cb4705eb38f3f1882e9fdfa2cbe59124ea
-
SSDEEP
24576:g5SV/z8py4whNMUP3iWHBnIk0I4pRsJG7xRGmFej9m3Y5jZXQHS:DJ8p3sN5/i4KD0gMmimCZF
Score1/10 -
-
-
Target
WaveInstaller (1).exe
-
Size
1.5MB
-
MD5
c822ab5332b11c9185765b157d0b6e17
-
SHA1
7fe909d73a24ddd87171896079cceb8b03663ad4
-
SHA256
344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a
-
SHA512
a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d
-
SSDEEP
24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks for any installed AV software in registry
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Event Triggered Execution
2Image File Execution Options Injection
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Image File Execution Options Injection
1Component Object Model Hijacking
1