Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 12:19
Behavioral task
behavioral1
Sample
WaveInstaller.exe
Resource
win7-20240704-en
General
-
Target
WaveInstaller.exe
-
Size
249KB
-
MD5
247af4e0a1a0d20bb625ece6439ee87d
-
SHA1
28ad251bb0db405924834583c216db028373c681
-
SHA256
a7b2894e48d292b192b8f33a3968c9b2c42e215b18d0b6ec91e4412d319f5608
-
SHA512
b4c87d609821173559cf5fcef7e2dfeb444a63f0222367e28bfd83c2f29ff33d0588fa6b4dd74402ccc502dd97ea4f6f489295d186ca3add5d5e40876c616142
-
SSDEEP
3072:+/H6zbxSl+GLAsNeDF5nI0PGIj9lua/Obw0hFv2PCWpIdNrY:yazbYlx0sNOBTunbw0/5Wpi
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
https://ooo.fluffiflower.xyz/:8848
ooo.fluffiflower.xyz:8848
2.132.191.110:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
Explorer.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002342d-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation WaveInstaller.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 Explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2596 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe 2492 WaveInstaller.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2492 WaveInstaller.exe Token: SeDebugPrivilege 1148 Explorer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1908 2492 WaveInstaller.exe 86 PID 2492 wrote to memory of 1908 2492 WaveInstaller.exe 86 PID 2492 wrote to memory of 532 2492 WaveInstaller.exe 87 PID 2492 wrote to memory of 532 2492 WaveInstaller.exe 87 PID 532 wrote to memory of 2596 532 cmd.exe 90 PID 532 wrote to memory of 2596 532 cmd.exe 90 PID 1908 wrote to memory of 2376 1908 cmd.exe 91 PID 1908 wrote to memory of 2376 1908 cmd.exe 91 PID 532 wrote to memory of 1148 532 cmd.exe 92 PID 532 wrote to memory of 1148 532 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Explorer" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Explorer" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF1D2.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2596
-
-
C:\Users\Admin\AppData\Roaming\Explorer.exe"C:\Users\Admin\AppData\Roaming\Explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58e76100e0d75fc683aa945b053defdbf
SHA1b9d591a174eb2c48c3190349b3986b35823854f3
SHA256caa288fd43c8cfd8711468084747c2ce9eb764c5449038514620e7151b4cd1ae
SHA51276ee83c5abfca1ef88d54a24a5728a7b318e146630ba40131239f4a8b345f55b9b8971e0506e50ea8f0b5f0a6dc67b488c4361a0d5549e69d9a97cf835c321fc
-
Filesize
249KB
MD5247af4e0a1a0d20bb625ece6439ee87d
SHA128ad251bb0db405924834583c216db028373c681
SHA256a7b2894e48d292b192b8f33a3968c9b2c42e215b18d0b6ec91e4412d319f5608
SHA512b4c87d609821173559cf5fcef7e2dfeb444a63f0222367e28bfd83c2f29ff33d0588fa6b4dd74402ccc502dd97ea4f6f489295d186ca3add5d5e40876c616142