Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 00:16

General

  • Target

    WaveInstaller(1).exe

  • Size

    1.5MB

  • MD5

    c822ab5332b11c9185765b157d0b6e17

  • SHA1

    7fe909d73a24ddd87171896079cceb8b03663ad4

  • SHA256

    344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

  • SHA512

    a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

  • SSDEEP

    24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveInstaller(1).exe
    "C:\Users\Admin\AppData\Local\Temp\WaveInstaller(1).exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2344

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
    Filesize

    949KB

    MD5

    8fb51b92d496c6765f7ba44e6d4a8990

    SHA1

    d3e5a8465622cd5adae05babeb7e34b2b5c777d7

    SHA256

    ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394

    SHA512

    20de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6

  • memory/2344-8-0x00000000753B0000-0x0000000075B60000-memory.dmp
    Filesize

    7.7MB

  • memory/2344-15-0x00000000014F0000-0x0000000001586000-memory.dmp
    Filesize

    600KB

  • memory/2344-3-0x00000000753B0000-0x0000000075B60000-memory.dmp
    Filesize

    7.7MB

  • memory/2344-4-0x00000000753B0000-0x0000000075B60000-memory.dmp
    Filesize

    7.7MB

  • memory/2344-5-0x0000000009C70000-0x0000000009CA8000-memory.dmp
    Filesize

    224KB

  • memory/2344-6-0x0000000009C40000-0x0000000009C4E000-memory.dmp
    Filesize

    56KB

  • memory/2344-2-0x00000000753B0000-0x0000000075B60000-memory.dmp
    Filesize

    7.7MB

  • memory/2344-0-0x00000000753BE000-0x00000000753BF000-memory.dmp
    Filesize

    4KB

  • memory/2344-7-0x00000000753BE000-0x00000000753BF000-memory.dmp
    Filesize

    4KB

  • memory/2344-16-0x00000000015A0000-0x00000000015C6000-memory.dmp
    Filesize

    152KB

  • memory/2344-17-0x00000000099E0000-0x00000000099E8000-memory.dmp
    Filesize

    32KB

  • memory/2344-19-0x000000000BFF0000-0x000000000C062000-memory.dmp
    Filesize

    456KB

  • memory/2344-20-0x000000000B490000-0x000000000B49A000-memory.dmp
    Filesize

    40KB

  • memory/2344-21-0x000000000BBC0000-0x000000000BBCA000-memory.dmp
    Filesize

    40KB

  • memory/2344-1-0x0000000000D70000-0x0000000000F02000-memory.dmp
    Filesize

    1.6MB