Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 17:22

General

  • Target

    Wave/CrackedWave/CefSharp.BrowserSubprocess.exe

  • Size

    7KB

  • MD5

    516ff62b2e1f4642caa954c0968719e8

  • SHA1

    e349d0ce82e2109dd0d18416d9cf46e8411b7f15

  • SHA256

    19da58849cec5933860116e60a1e94b08e30d90e0f955768270b47998d612045

  • SHA512

    7aa4a0c87b29c2a84f585a884d8208fc2352a43f2cdb549c100e3b121837ad5f8dadb1101f57d1d3fcb7ebec9d9f22e07dc14239b7d2e2d25793c999becf288b

  • SSDEEP

    96:VpZxBI7kRTmQBDvTR/GNHAeFZZetmArNt61OYcXe5U:XBIYTmQBHRsHAeFZKsAYcXeS

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wave\CrackedWave\CefSharp.BrowserSubprocess.exe
    "C:\Users\Admin\AppData\Local\Temp\Wave\CrackedWave\CefSharp.BrowserSubprocess.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4848-0-0x000000007507E000-0x000000007507F000-memory.dmp

    Filesize

    4KB

  • memory/4848-1-0x0000000000860000-0x0000000000868000-memory.dmp

    Filesize

    32KB

  • memory/4848-2-0x0000000005150000-0x000000000523A000-memory.dmp

    Filesize

    936KB

  • memory/4848-3-0x0000000005330000-0x000000000537A000-memory.dmp

    Filesize

    296KB