General

  • Target

    WaveInstaller___40_1__41_.zip

  • Size

    1.3MB

  • Sample

    240709-2yecpasgma

  • MD5

    a1f9a6535ae97d467209bb5ce4815b2a

  • SHA1

    8a1f6ebba01314ec292aedf6e1c3ba1f95a109fe

  • SHA256

    90eef2098cfec84d5ea5356f6409e81ec2483e64608b2da5a4f164aaa2e416df

  • SHA512

    7e3f91f42804f86de1d8fd2636e3dd45cf6bc837db6bc3ded231e46c7a0d293ee1e457653fc4f1b10435ed29830795cb4705eb38f3f1882e9fdfa2cbe59124ea

  • SSDEEP

    24576:g5SV/z8py4whNMUP3iWHBnIk0I4pRsJG7xRGmFej9m3Y5jZXQHS:DJ8p3sN5/i4KD0gMmimCZF

Malware Config

Targets

    • Target

      WaveInstaller___40_1__41_.zip

    • Size

      1.3MB

    • MD5

      a1f9a6535ae97d467209bb5ce4815b2a

    • SHA1

      8a1f6ebba01314ec292aedf6e1c3ba1f95a109fe

    • SHA256

      90eef2098cfec84d5ea5356f6409e81ec2483e64608b2da5a4f164aaa2e416df

    • SHA512

      7e3f91f42804f86de1d8fd2636e3dd45cf6bc837db6bc3ded231e46c7a0d293ee1e457653fc4f1b10435ed29830795cb4705eb38f3f1882e9fdfa2cbe59124ea

    • SSDEEP

      24576:g5SV/z8py4whNMUP3iWHBnIk0I4pRsJG7xRGmFej9m3Y5jZXQHS:DJ8p3sN5/i4KD0gMmimCZF

    Score
    1/10
    • Target

      WaveInstaller (1).exe

    • Size

      1.5MB

    • MD5

      c822ab5332b11c9185765b157d0b6e17

    • SHA1

      7fe909d73a24ddd87171896079cceb8b03663ad4

    • SHA256

      344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

    • SHA512

      a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

    • SSDEEP

      24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks for any installed AV software in registry

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Command and Control

Web Service

1
T1102

Tasks