Resubmissions

20-07-2024 11:13

240720-nbxc4ayekr 6

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-07-2024 11:13

General

  • Target

    WaveInstaller Official.exe

  • Size

    1.5MB

  • MD5

    c822ab5332b11c9185765b157d0b6e17

  • SHA1

    7fe909d73a24ddd87171896079cceb8b03663ad4

  • SHA256

    344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

  • SHA512

    a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

  • SSDEEP

    24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveInstaller Official.exe
    "C:\Users\Admin\AppData\Local\Temp\WaveInstaller Official.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1572

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
    Filesize

    949KB

    MD5

    8fb51b92d496c6765f7ba44e6d4a8990

    SHA1

    d3e5a8465622cd5adae05babeb7e34b2b5c777d7

    SHA256

    ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394

    SHA512

    20de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6

  • memory/1572-8-0x0000000074A40000-0x00000000751F1000-memory.dmp
    Filesize

    7.7MB

  • memory/1572-15-0x0000000000B40000-0x0000000000BD6000-memory.dmp
    Filesize

    600KB

  • memory/1572-3-0x0000000074A40000-0x00000000751F1000-memory.dmp
    Filesize

    7.7MB

  • memory/1572-4-0x0000000009440000-0x0000000009478000-memory.dmp
    Filesize

    224KB

  • memory/1572-5-0x0000000009410000-0x000000000941E000-memory.dmp
    Filesize

    56KB

  • memory/1572-6-0x0000000074A4E000-0x0000000074A4F000-memory.dmp
    Filesize

    4KB

  • memory/1572-2-0x0000000074A40000-0x00000000751F1000-memory.dmp
    Filesize

    7.7MB

  • memory/1572-0-0x0000000074A4E000-0x0000000074A4F000-memory.dmp
    Filesize

    4KB

  • memory/1572-7-0x0000000074A40000-0x00000000751F1000-memory.dmp
    Filesize

    7.7MB

  • memory/1572-16-0x0000000000AC0000-0x0000000000AE6000-memory.dmp
    Filesize

    152KB

  • memory/1572-17-0x0000000000B00000-0x0000000000B08000-memory.dmp
    Filesize

    32KB

  • memory/1572-19-0x0000000000BE0000-0x0000000000C52000-memory.dmp
    Filesize

    456KB

  • memory/1572-21-0x0000000000C70000-0x0000000000C7A000-memory.dmp
    Filesize

    40KB

  • memory/1572-20-0x0000000000C60000-0x0000000000C6A000-memory.dmp
    Filesize

    40KB

  • memory/1572-1-0x0000000000010000-0x00000000001A2000-memory.dmp
    Filesize

    1.6MB