Overview
overview
10Static
static
3Wave.rar
windows7-x64
3Wave.rar
windows10-2004-x64
3Wave/Crack...re.dll
windows7-x64
1Wave/Crack...re.dll
windows10-2004-x64
3Wave/Crack...ss.exe
windows7-x64
3Wave/Crack...ss.exe
windows10-2004-x64
1Wave/Crack...me.dll
windows7-x64
1Wave/Crack...me.dll
windows10-2004-x64
3Wave/Crack...re.dll
windows7-x64
1Wave/Crack...re.dll
windows10-2004-x64
1Wave/Crack...pf.dll
windows7-x64
1Wave/Crack...pf.dll
windows10-2004-x64
1Wave/Crack...rp.dll
windows7-x64
1Wave/Crack...rp.dll
windows10-2004-x64
1Wave/Crack...ve.exe
windows7-x64
7Wave/Crack...ve.exe
windows10-2004-x64
10Wave/Crack...er.exe
windows7-x64
3Wave/Crack...er.exe
windows10-2004-x64
1Wave/Crack...nd.mp4
windows7-x64
1Wave/Crack...nd.mp4
windows10-2004-x64
6Wave/Crack...z4.dll
windows7-x64
1Wave/Crack...z4.dll
windows10-2004-x64
1Wave/Crack...sl.dll
windows7-x64
1Wave/Crack...sl.dll
windows10-2004-x64
1Wave/Crack...sh.dll
windows7-x64
1Wave/Crack...sh.dll
windows10-2004-x64
1Wave/Crack...b1.dll
windows7-x64
1Wave/Crack...b1.dll
windows10-2004-x64
1Wave/Crack...td.dll
windows7-x64
1Wave/Crack...td.dll
windows10-2004-x64
1Wave/Crack...nt.pak
windows7-x64
3Wave/Crack...nt.pak
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
Wave.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Wave.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.Core.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.Core.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Wave/CrackedWave/CefSharp.BrowserSubprocess.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Wave/CrackedWave/CefSharp.Core.Runtime.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Wave/CrackedWave/CefSharp.Core.Runtime.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Wave/CrackedWave/CefSharp.Core.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Wave/CrackedWave/CefSharp.Core.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Wave/CrackedWave/CefSharp.Wpf.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Wave/CrackedWave/CefSharp.Wpf.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Wave/CrackedWave/CefSharp.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Wave/CrackedWave/CefSharp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Wave/CrackedWave/CrackedWave.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Wave/CrackedWave/CrackedWave.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Wave/CrackedWave/WaveBootstrapper.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Wave/CrackedWave/WaveBootstrapper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Wave/CrackedWave/bin/Background.mp4
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Wave/CrackedWave/bin/Background.mp4
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Wave/CrackedWave/bin/lz4.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Wave/CrackedWave/bin/lz4.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Wave/CrackedWave/bin/wolfssl.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Wave/CrackedWave/bin/wolfssl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Wave/CrackedWave/bin/xxhash.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Wave/CrackedWave/bin/xxhash.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Wave/CrackedWave/bin/zlib1.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Wave/CrackedWave/bin/zlib1.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
Wave/CrackedWave/bin/zstd.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
Wave/CrackedWave/bin/zstd.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Wave/CrackedWave/chrome_100_percent.pak
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Wave/CrackedWave/chrome_100_percent.pak
Resource
win10v2004-20240709-en
General
-
Target
Wave/CrackedWave/bin/Background.mp4
-
Size
4.6MB
-
MD5
9782180eb68f73030fe24ef6a1735932
-
SHA1
589827fe098ba048c9f871a28db8eae3e3537ff4
-
SHA256
3a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
-
SHA512
dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
SSDEEP
98304:xs/6Ldccul3Wn48btjNEkPSFTaIwJ0Mt6KNY:xs/Gul3EvEmFItMkb
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-464762018-485119342-1613148473-1000\{500ACDAE-8084-4BA7-AAA9-B00F9FE7AB8F} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3880 unregmp2.exe Token: SeCreatePagefilePrivilege 3880 unregmp2.exe Token: SeShutdownPrivilege 4920 wmplayer.exe Token: SeCreatePagefilePrivilege 4920 wmplayer.exe Token: 33 2584 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2584 AUDIODG.EXE Token: SeShutdownPrivilege 4920 wmplayer.exe Token: SeCreatePagefilePrivilege 4920 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4920 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4920 wrote to memory of 1288 4920 wmplayer.exe 85 PID 4920 wrote to memory of 1288 4920 wmplayer.exe 85 PID 4920 wrote to memory of 1288 4920 wmplayer.exe 85 PID 1288 wrote to memory of 3880 1288 unregmp2.exe 86 PID 1288 wrote to memory of 3880 1288 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Wave\CrackedWave\bin\Background.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1512
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5c7ca2711d80cd052da0d98ce7e6dec6b
SHA1b051f0425224cf70e3a10636c21bf113bd1cd301
SHA256a0c1147d7f6adb99735dc3fa370ef6fb8e6ddd3687eb7afd677af5c71df6957f
SHA512487b985fe8a4fb9a0cb59ffb0b485133e0b089115e36b9bc3f0cbb64babd899daf1b282a9554b45874a59a4c7d9c07db370650c28a5731bde50f52e66a0fc0af
-
Filesize
1024KB
MD5fdf399c126a75a24334ba89f62664dd1
SHA1d0f0afed399600071e5d9f097ff98980174a4d3a
SHA2565c67669f43aa9830475b845a5dce5d7e41fe4fd39217fdcb291f72106eabca0b
SHA512c24cec108833739f0a96a843f75353ac0f41b30b937c6a17d6b4d02b0a8f76a3acb0b3e8f90455a218107e6832d136ff5c498d6e5cf204d26d643aa9776acf1b
-
Filesize
68KB
MD55ecd8aeae9d7498c77f23a714b18bd8b
SHA117cdcb43a44788ffbf39decb7ec841d4ed0ae909
SHA256282edce130585c94829154ad3b6be73d85016ee0b3316d6204bff85a52b97c15
SHA5121e47d78c72da40c1e2aea1d2d5e1a3012fdd580c13369895592d10235d9a2f23decc5eefe84a4aa54ac2f3371a15c2707c0ca75ce4029af25764ebd3a90acccd
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD552d9efe46b9d25ce61a9a7d138e14995
SHA18c861fba16adba87c67bf6fa610dbf0f61562626
SHA2561c50cb138f7b46ef31e74fe5faf9d1153cb9a353b22dc87a0030a7d3f19f6544
SHA512ef72bb83b8df7e378b304236048e9b06d5f00212d688d7803adad4f04aed8a7c59a1b61d0b86b52f22ea88844a2c72eb255b1a9329d15048c9bbb48c335e38a8