Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Wave/CefSh...me.dll
windows11-21h2-x64
1Wave/WaveW...nc.exe
windows11-21h2-x64
10Wave/bin/lz4.dll
windows11-21h2-x64
1Wave/bin/wolfssl.dll
windows11-21h2-x64
1Wave/bin/xxhash.dll
windows11-21h2-x64
1Wave/bin/zlib1.dll
windows11-21h2-x64
1Wave/bin/zstd.dll
windows11-21h2-x64
1Wave/d3dco...47.dll
windows11-21h2-x64
3Analysis
-
max time kernel
108s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/07/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
Wave/CefSharp.Core.Runtime.dll
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Wave/WaveWindows-nc.exe
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Wave/bin/lz4.dll
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
Wave/bin/wolfssl.dll
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
Wave/bin/xxhash.dll
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
Wave/bin/zlib1.dll
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
Wave/bin/zstd.dll
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
Wave/d3dcompiler_47.dll
Resource
win11-20240709-en
General
-
Target
Wave/CefSharp.Core.Runtime.dll
-
Size
1.3MB
-
MD5
09cba584aa0aae9fc600745567393ef6
-
SHA1
bbd1f93cb0db9cf9e01071b3bed1b4afd6e31279
-
SHA256
0babd84d4e7dc2713e7265d5ac25a3c28d412e705870cded6f5c7c550a5bf8d5
-
SHA512
5f914fa33a63a6d4b46f39c7279687f313728fd5f8437ec592369a2da3256ccff6f325f78ace0e6d3a2c37da1f681058556f7603da13c45b03f2808f779d2aa1
-
SSDEEP
24576:5Ac2t6Twn/0ke6ruDPMY0BQJzTzAC991g44ekgpqc4CQKZi5P9xh0gsWLgiHesms:q6TmQJrXg44ekgpqc4CQKZi5P9xh0gsI
Malware Config
Signatures
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2724 wrote to memory of 1956 2724 rundll32.exe 81 PID 2724 wrote to memory of 1956 2724 rundll32.exe 81 PID 2724 wrote to memory of 1956 2724 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Wave\CefSharp.Core.Runtime.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Wave\CefSharp.Core.Runtime.dll,#12⤵PID:1956
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2864
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2532
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD51015d2fd919a3b62e193194c7bfafbef
SHA1f7f3314dd817edcee90f87491f74825b197f476b
SHA256990002e556b74d16e89d7f6c8be6ac5870e9be8b904ec52e87d92631fa09467b
SHA512ffc7702179fb30851f4646f26a53e87c0215e320e117901c726a6294bf428540134e1fd14fce37a0b430e8379b4c56d6f57b582efff5654e2ed4624453762bea
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\~earchHoverUnifiedTileModelCache.tmp
Filesize10KB
MD5710bfbb3733035e8ef5cc41f17e6ca18
SHA1f8f6b808c86e76167597a40bf364e92e0adcf195
SHA25692a6dab02ff468c00c1d32b27a27f241b223ea1974238adb24c015d0527e4c13
SHA51271414895a7e2f543197003ea16e0e8c94e6a203e32874d81332ccf5fba775f18963575991bc03d373238e59761a535d8b00b64ce4b4c6038be3bc458a15f8e18