Overview
overview
10Static
static
3Wave.rar
windows11-21h2-x64
3Wave/Crack...re.dll
windows11-21h2-x64
3Wave/Crack...ss.exe
windows11-21h2-x64
1Wave/Crack...me.dll
windows11-21h2-x64
3Wave/Crack...re.dll
windows11-21h2-x64
1Wave/Crack...pf.dll
windows11-21h2-x64
1Wave/Crack...rp.dll
windows11-21h2-x64
1Wave/Crack...ve.exe
windows11-21h2-x64
10Wave/Crack...er.exe
windows11-21h2-x64
1Wave/Crack...nd.mp4
windows11-21h2-x64
6Wave/Crack...z4.dll
windows11-21h2-x64
1Wave/Crack...sl.dll
windows11-21h2-x64
1Wave/Crack...sh.dll
windows11-21h2-x64
1Wave/Crack...b1.dll
windows11-21h2-x64
1Wave/Crack...td.dll
windows11-21h2-x64
1Wave/Crack...nt.pak
windows11-21h2-x64
3Wave/Crack...nt.pak
windows11-21h2-x64
3Wave/Crack...lf.dll
windows11-21h2-x64
1Wave/Crack...47.dll
windows11-21h2-x64
3Wave/Crack...tl.dat
windows11-21h2-x64
3Wave/Crack...GL.dll
windows11-21h2-x64
1Wave/Crack...v2.dll
windows11-21h2-x64
1Wave/Crack...ef.dll
windows11-21h2-x64
1Wave/Crack...US.pak
windows11-21h2-x64
3Wave/Crack...es.pak
windows11-21h2-x64
3Wave/Crack...ot.bin
windows11-21h2-x64
3Wave/Crack...er.dll
windows11-21h2-x64
3Wave/IMPOR...NG.txt
windows11-21h2-x64
3Analysis
-
max time kernel
272s -
max time network
277s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-07-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
Wave.rar
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.Core.dll
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.exe
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
Wave/CrackedWave/CefSharp.Core.Runtime.dll
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
Wave/CrackedWave/CefSharp.Core.dll
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
Wave/CrackedWave/CefSharp.Wpf.dll
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
Wave/CrackedWave/CefSharp.dll
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
Wave/CrackedWave/CrackedWave.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
Wave/CrackedWave/WaveBootstrapper.exe
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
Wave/CrackedWave/bin/Background.mp4
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
Wave/CrackedWave/bin/lz4.dll
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
Wave/CrackedWave/bin/wolfssl.dll
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
Wave/CrackedWave/bin/xxhash.dll
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
Wave/CrackedWave/bin/zlib1.dll
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
Wave/CrackedWave/bin/zstd.dll
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
Wave/CrackedWave/chrome_100_percent.pak
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
Wave/CrackedWave/chrome_200_percent.pak
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
Wave/CrackedWave/chrome_elf.dll
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
Wave/CrackedWave/d3dcompiler_47.dll
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
Wave/CrackedWave/icudtl.dat
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
Wave/CrackedWave/libEGL.dll
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
Wave/CrackedWave/libGLESv2.dll
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
Wave/CrackedWave/libcef.dll
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
Wave/CrackedWave/locales/en-US.pak
Resource
win11-20240709-en
Behavioral task
behavioral25
Sample
Wave/CrackedWave/resources.pak
Resource
win11-20240709-en
Behavioral task
behavioral26
Sample
Wave/CrackedWave/v8_context_snapshot.bin
Resource
win11-20240709-en
Behavioral task
behavioral27
Sample
Wave/CrackedWave/vk_swiftshader.dll
Resource
win11-20240709-en
Behavioral task
behavioral28
Sample
Wave/IMPORTANT READ FIRST BEFORE OPENING.txt
Resource
win11-20240709-en
General
-
Target
Wave/CrackedWave/bin/Background.mp4
-
Size
4.6MB
-
MD5
9782180eb68f73030fe24ef6a1735932
-
SHA1
589827fe098ba048c9f871a28db8eae3e3537ff4
-
SHA256
3a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
-
SHA512
dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
SSDEEP
98304:xs/6Ldccul3Wn48btjNEkPSFTaIwJ0Mt6KNY:xs/Gul3EvEmFItMkb
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-95457810-830748662-4054918673-1000\{40023283-3A83-47E2-886D-86BA203E6C1B} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2320 wmplayer.exe Token: SeCreatePagefilePrivilege 2320 wmplayer.exe Token: SeShutdownPrivilege 3108 unregmp2.exe Token: SeCreatePagefilePrivilege 3108 unregmp2.exe Token: 33 2124 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2124 AUDIODG.EXE Token: SeShutdownPrivilege 2320 wmplayer.exe Token: SeCreatePagefilePrivilege 2320 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2320 wrote to memory of 248 2320 wmplayer.exe 78 PID 2320 wrote to memory of 248 2320 wmplayer.exe 78 PID 2320 wrote to memory of 248 2320 wmplayer.exe 78 PID 248 wrote to memory of 3108 248 unregmp2.exe 79 PID 248 wrote to memory of 3108 248 unregmp2.exe 79
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Wave\CrackedWave\bin\Background.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4164
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004BC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD519d78b1eae63fd95e33c36ae0cad7aa8
SHA152bbbd1abf5e05fd11b19462a54685e7ccfc2d4b
SHA25650c2e86388d63a5a5a2052f9866083e8784c3eed266f9b947b4f5772e5fbcf80
SHA51234d6dd06fc41e2a3bf026cc58e461cf12064eab6969225d118b786aaacfabaac8bd7cbc6c26ad2c985faa04f0a07a4134119d4780c9189ded6db3d0fe9b59454
-
Filesize
1024KB
MD57bae5fdbc1fd99a9d516a06ed23cea3b
SHA19cf233e282fc3b582d880a315eb843710a8c8325
SHA25651a59b6cedbeff5305dd99101a41d5214526f7f088c664ec62b9eb52d6eaefce
SHA512a1b37f8f3af7ed48f41d8a2bd7d049555a78cea82e3353ebc3f653d5630f5d81ad94877646e803f3aac999978e6ac439592c937afcf8b908078bc7cc8984fed3
-
Filesize
68KB
MD5eb4632227b656d9d720b142ba65fb33f
SHA1048c1e15b666d2a11f68f7795421367604ace212
SHA256935f1dbf9aaaf84434c8623a42c0bd98a51fa40787a42d840ca5254e7773b381
SHA5126f1cca362f49d2fb27b51fbd6e666b6a7ca73c761a7bd3340d4cdc70610aa9e85feea91ce812fa03245ed0ae8c7465842561640d570d3248f55343a931a8927a
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD525709dd653d43ba127d78a6ebf20f11e
SHA14e0029d3831c942288b071567caf3628a9b68d80
SHA256f29b2ce52c7d68afbdf4b93d196f1b4530eace7248052a8b8f47aa8c66895884
SHA5128ef12b7b84e58346e211481e17913b109acebe7d364cd1a68d91379b53a80aff965fbd28a3bb3be166a245b3363ffa20beeba21a89d7ca1277c71295eea08ed1