Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 16:49

General

  • Target

    WaveInstaller Official.exe

  • Size

    1.5MB

  • MD5

    c822ab5332b11c9185765b157d0b6e17

  • SHA1

    7fe909d73a24ddd87171896079cceb8b03663ad4

  • SHA256

    344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

  • SHA512

    a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

  • SSDEEP

    24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveInstaller Official.exe
    "C:\Users\Admin\AppData\Local\Temp\WaveInstaller Official.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
      "C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe
        "C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"
        3⤵
        • Executes dropped EXE
        PID:3416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe

    Filesize

    949KB

    MD5

    8fb51b92d496c6765f7ba44e6d4a8990

    SHA1

    d3e5a8465622cd5adae05babeb7e34b2b5c777d7

    SHA256

    ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394

    SHA512

    20de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6

  • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe

    Filesize

    8.0MB

    MD5

    b8631bbd78d3935042e47b672c19ccc3

    SHA1

    cd0ea137f1544a31d2a62aaed157486dce3ecebe

    SHA256

    9cfda541d595dc20a55df5422001dfb58debd401df3abff21b1eee8ede28451c

    SHA512

    0c51d6247e39f7851538a5916b24972e845abfe429f0abdc7b532f654b4afe73dc6e1936f1b062da63bfc90273d3cbc297bf6c802e615f3711d0f180c070aa26

  • memory/1272-236-0x000000000A240000-0x000000000A24A000-memory.dmp

    Filesize

    40KB

  • memory/1272-231-0x00007FFF48FD0000-0x00007FFF491C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1272-242-0x00007FFF48FD0000-0x00007FFF491C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1272-238-0x000000000A2E0000-0x000000000A2FE000-memory.dmp

    Filesize

    120KB

  • memory/1272-237-0x000000000A280000-0x000000000A288000-memory.dmp

    Filesize

    32KB

  • memory/1272-235-0x000000000A200000-0x000000000A216000-memory.dmp

    Filesize

    88KB

  • memory/1272-234-0x0000000009500000-0x0000000009604000-memory.dmp

    Filesize

    1.0MB

  • memory/1272-232-0x0000000000C10000-0x0000000000D02000-memory.dmp

    Filesize

    968KB

  • memory/2392-14-0x00000000077A0000-0x0000000007812000-memory.dmp

    Filesize

    456KB

  • memory/2392-2-0x0000000006240000-0x0000000006278000-memory.dmp

    Filesize

    224KB

  • memory/2392-16-0x0000000007830000-0x000000000783A000-memory.dmp

    Filesize

    40KB

  • memory/2392-15-0x0000000007820000-0x000000000782A000-memory.dmp

    Filesize

    40KB

  • memory/2392-3-0x0000000006220000-0x000000000622E000-memory.dmp

    Filesize

    56KB

  • memory/2392-0-0x00007FFF48FD0000-0x00007FFF491C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-12-0x0000000001950000-0x0000000001958000-memory.dmp

    Filesize

    32KB

  • memory/2392-11-0x0000000001800000-0x0000000001826000-memory.dmp

    Filesize

    152KB

  • memory/2392-1-0x0000000000D40000-0x0000000000ED2000-memory.dmp

    Filesize

    1.6MB

  • memory/2392-10-0x0000000001760000-0x00000000017F6000-memory.dmp

    Filesize

    600KB