Overview
overview
10Static
static
3Wave (1).rar
windows10-2004-x64
5Wave/Crack...re.dll
windows10-2004-x64
3Wave/Crack...ss.exe
windows10-2004-x64
1Wave/Crack...me.dll
windows10-2004-x64
3Wave/Crack...re.dll
windows10-2004-x64
1Wave/Crack...pf.dll
windows10-2004-x64
1Wave/Crack...rp.dll
windows10-2004-x64
1Wave/Crack...ve.exe
windows10-2004-x64
10Wave/Crack...er.exe
windows10-2004-x64
1Wave/Crack...nd.mp4
windows10-2004-x64
6Wave/Crack...z4.dll
windows10-2004-x64
1Wave/Crack...sl.dll
windows10-2004-x64
1Wave/Crack...sh.dll
windows10-2004-x64
1Wave/Crack...b1.dll
windows10-2004-x64
1Wave/Crack...td.dll
windows10-2004-x64
1Wave/Crack...nt.pak
windows10-2004-x64
3Wave/Crack...nt.pak
windows10-2004-x64
3Wave/Crack...lf.dll
windows10-2004-x64
1Wave/Crack...47.dll
windows10-2004-x64
3Wave/Crack...tl.dat
windows10-2004-x64
3Wave/Crack...GL.dll
windows10-2004-x64
1Wave/Crack...v2.dll
windows10-2004-x64
1Wave/Crack...ef.dll
windows10-2004-x64
1Wave/Crack...US.pak
windows10-2004-x64
3Wave/Crack...es.pak
windows10-2004-x64
3Wave/Crack...ot.bin
windows10-2004-x64
3Wave/Crack...er.dll
windows10-2004-x64
3Wave/IMPOR...NG.txt
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
Wave (1).rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.Core.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Wave/CrackedWave/CefSharp.Core.Runtime.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Wave/CrackedWave/CefSharp.Core.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
Wave/CrackedWave/CefSharp.Wpf.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Wave/CrackedWave/CefSharp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Wave/CrackedWave/CrackedWave.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Wave/CrackedWave/WaveBootstrapper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Wave/CrackedWave/bin/Background.mp4
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Wave/CrackedWave/bin/lz4.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Wave/CrackedWave/bin/wolfssl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Wave/CrackedWave/bin/xxhash.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Wave/CrackedWave/bin/zlib1.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Wave/CrackedWave/bin/zstd.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
Wave/CrackedWave/chrome_100_percent.pak
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Wave/CrackedWave/chrome_200_percent.pak
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
Wave/CrackedWave/chrome_elf.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Wave/CrackedWave/d3dcompiler_47.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
Wave/CrackedWave/icudtl.dat
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Wave/CrackedWave/libEGL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
Wave/CrackedWave/libGLESv2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Wave/CrackedWave/libcef.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
Wave/CrackedWave/locales/en-US.pak
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Wave/CrackedWave/resources.pak
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
Wave/CrackedWave/v8_context_snapshot.bin
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Wave/CrackedWave/vk_swiftshader.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
Wave/IMPORTANT READ FIRST BEFORE OPENING.txt
Resource
win10v2004-20240709-en
General
-
Target
Wave/CrackedWave/bin/Background.mp4
-
Size
4.6MB
-
MD5
9782180eb68f73030fe24ef6a1735932
-
SHA1
589827fe098ba048c9f871a28db8eae3e3537ff4
-
SHA256
3a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
-
SHA512
dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
SSDEEP
98304:xs/6Ldccul3Wn48btjNEkPSFTaIwJ0Mt6KNY:xs/Gul3EvEmFItMkb
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4432 1924 WerFault.exe 86 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1750093773-264148664-1320403265-1000\{75FE23B8-5DB6-4ADB-B069-044C04954387} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1924 wmplayer.exe Token: SeCreatePagefilePrivilege 1924 wmplayer.exe Token: SeShutdownPrivilege 1320 unregmp2.exe Token: SeCreatePagefilePrivilege 1320 unregmp2.exe Token: 33 1216 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1216 AUDIODG.EXE Token: SeShutdownPrivilege 1924 wmplayer.exe Token: SeCreatePagefilePrivilege 1924 wmplayer.exe Token: SeShutdownPrivilege 1924 wmplayer.exe Token: SeCreatePagefilePrivilege 1924 wmplayer.exe Token: SeShutdownPrivilege 1924 wmplayer.exe Token: SeCreatePagefilePrivilege 1924 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4496 1924 wmplayer.exe 87 PID 1924 wrote to memory of 4496 1924 wmplayer.exe 87 PID 1924 wrote to memory of 4496 1924 wmplayer.exe 87 PID 4496 wrote to memory of 1320 4496 unregmp2.exe 89 PID 4496 wrote to memory of 1320 4496 unregmp2.exe 89
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Wave\CrackedWave\bin\Background.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 23482⤵
- Program crash
PID:4432
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3016
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1924 -ip 19241⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a9582cb9912fd847e8bbcba947ce4987
SHA1c05ee133c580bd97ad8c050b8b3a8f3fbd9b7566
SHA2569d6d60adb6cbafe9d3e0af91ccfe8bae7f105db861763292ba777c3684056465
SHA5125cb7dce29e9802d86f78843aec0907da4ed704989d3a1a507e5424c9386ebfc6f27115399cd9d12e8738e647099ab03b4e281065dba98d2e06100aeb34ab35cf
-
Filesize
1024KB
MD539aa153acb7a09606c91c5057365512c
SHA186708d4d690ed7d80281f2a141784536e2e43f5b
SHA256614c6a55f97122d666cf817a468a27e5bf3328915c57315505ed35f5c68b5a4e
SHA5127b10c9c67b9295bb14d3cfd6175e5bf5ae37759b3feafb43d74c0b58ec42fad9a3aae31c27008f38150eb4e923acd8b1f05adf21a370c4133a64a10654cd7211
-
Filesize
68KB
MD54b53760ffe686f7cadb1ab5138ff4044
SHA159ac38d985c0835d447aecfae4db693efdebfa91
SHA2563a5f983ac2dcd219ad66ebaf6c182b069ae8c3da9654ea7c327da5f8ccc1d385
SHA512be039aef1212558d20f65e54bb6037c5def2c87a7408405b83de2a73c8c701db12e0c4ee6ead3d990cc2a8e8e81e598a3c311f8139d754640839fdf7d3259fb9
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5001bcd1c041195d88e45ec66e3951fba
SHA1be9508cc68f8b6b8d24eca07419d8e132e311669
SHA2562d811dc5edaab85b01304aad84043dff27919f7394a2168d48be757317aa7603
SHA5122eb1df6402112a8f9b24e58f75cc1484fa3b4a56955928d558cba2e6dccb093d9b9ee06f624ae2c5fffc5b257cd5b9758b955178bf456505e7bfaae481cb0ba3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5ed9a6918cf980b3efc591e3a8bad11a2
SHA1330e4f06e4a7e86bcf9c51ba7790272d47ce5eb0
SHA2566f18f26485f3c02ac64a4cbefd3190692df547c8d2384cb410bd4c6416ec2d8c
SHA512e24e4dee1bdd117ebc9f1244a9ecdcfce089722e1418ea6d03ff7f21ce0bf43e7852be0c69d673406bf47f907637aa9e984cc954a86905746eefde6c190fc9d0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD5fdc31cf4bf7e257fb28fa5f98c7ff796
SHA11925a7c418d1d89343dfcd16dba8c04e19bf2b5f
SHA2566bc2c6486b861387a3d41907e21968c69438beb4c0cb74bfaf349708172df995
SHA5127ef0e46ae8b4bbb355bfa4f595d4aa7a4fcc29cd855dea29441ce97a2987b37908afb2b9d27d9a6012a7cfaeec56a6766fd87aee1a8f1100696988b67e3988a2