Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/07/2024, 11:12

240725-nav4msybrc 8

25/07/2024, 11:10

240725-m9y4xavgkk 8

Analysis

  • max time kernel
    300s
  • max time network
    277s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 11:12

General

  • Target

    wave-server.exe

  • Size

    8.8MB

  • MD5

    a227c8183df069184a11a03607fb382e

  • SHA1

    c3fe442f17f23dfef81cc588c7d39cb2424b2f10

  • SHA256

    aace88c7fb32eb62e10a709eacd2baf7e341f124f4370b870aeaf09f9584ad12

  • SHA512

    05c909850aab0a02fe20cf77adca595c74d0426fed388075c131539eb44c28287edbcd27a9226dbc0cec11b0131865f9759bcb4b45fd458b6ad32981ca6bc282

  • SSDEEP

    49152:poPUiCJMn2ZJPi89zCD8O26i29S4WhVVGjq4GrA3356Kw4CjWu5Ey35C8Q2djKSd:nJiBqwjnWhnMGr0h6ER8zP8rg6CVQmT

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\wave-server.exe
    "C:\Users\Admin\AppData\Local\Temp\wave-server.exe"
    1⤵
    • Drops file in Drivers directory
    PID:1584
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3772
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2028
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Windows\System32\drivers\etc\hosts
        2⤵
          PID:4932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\System32\drivers\etc\hosts

        Filesize

        80B

        MD5

        dda0b27bf75fba273b6f404196f74684

        SHA1

        b1e7cabde59c2812fdcb425c01bb6c2c586bee17

        SHA256

        4af14863bc0bf48fc14baf59b0dcfdf0a2db4e94bced60f080ec4879e5aab6a6

        SHA512

        eb68a24138f70a14fcb228f1995846579234beb3bfe47f4bba44e32322555cc62b627cd7a9f7dfe6a3abf195cfcc59555cdc791e4930242a9b9f132632fc2d4c

      • memory/3772-1-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-3-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-2-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-7-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-13-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-8-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-12-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-11-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-10-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB

      • memory/3772-9-0x00000254887E0000-0x00000254887E1000-memory.dmp

        Filesize

        4KB