General
-
Target
WaveWindows.exe
-
Size
8.0MB
-
Sample
240726-v7465sxbld
-
MD5
b8631bbd78d3935042e47b672c19ccc3
-
SHA1
cd0ea137f1544a31d2a62aaed157486dce3ecebe
-
SHA256
9cfda541d595dc20a55df5422001dfb58debd401df3abff21b1eee8ede28451c
-
SHA512
0c51d6247e39f7851538a5916b24972e845abfe429f0abdc7b532f654b4afe73dc6e1936f1b062da63bfc90273d3cbc297bf6c802e615f3711d0f180c070aa26
-
SSDEEP
196608:0G5rY45g686QOL+rSYG6rBQ5I1NkSI4A/zLWYnI2RtCKkVJI55mTS4:0erY4G686QOSrSYXNkSALPvz5IH
Static task
static1
Behavioral task
behavioral1
Sample
WaveWindows.exe
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
WaveWindows.exe
-
Size
8.0MB
-
MD5
b8631bbd78d3935042e47b672c19ccc3
-
SHA1
cd0ea137f1544a31d2a62aaed157486dce3ecebe
-
SHA256
9cfda541d595dc20a55df5422001dfb58debd401df3abff21b1eee8ede28451c
-
SHA512
0c51d6247e39f7851538a5916b24972e845abfe429f0abdc7b532f654b4afe73dc6e1936f1b062da63bfc90273d3cbc297bf6c802e615f3711d0f180c070aa26
-
SSDEEP
196608:0G5rY45g686QOL+rSYG6rBQ5I1NkSI4A/zLWYnI2RtCKkVJI55mTS4:0erY4G686QOSrSYXNkSALPvz5IH
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1