Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 17:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
WaveWindows.exe
Resource
win10v2004-20240709-en
6 signatures
300 seconds
General
-
Target
WaveWindows.exe
-
Size
33.0MB
-
MD5
b6b21c49c19c5a1bf0596feafa70489c
-
SHA1
2c7b3d37622aad66d624ad3befc6bb752385c06c
-
SHA256
c0b7b00bfcd71d9f4c9b563c13380a71e82d531fe10593d8d97a1041a4c1afe1
-
SHA512
b78e560b53a73d6aa06635ad5a7b713c9b1f2f6190883fd1b22d4d560f4b3ed78af66b9e19229881ce7d975c635df225c2d9263210270c8d097d41ce91eab6a9
-
SSDEEP
393216:XQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgj96l+ZArYsFRlqB1:X3on1HvSzxAMNjFZArYscRiXe
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1756 taskmgr.exe Token: SeSystemProfilePrivilege 1756 taskmgr.exe Token: SeCreateGlobalPrivilege 1756 taskmgr.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe"C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe"1⤵PID:1068
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1756