Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WaveInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
opengl32.dll
Resource
win10v2004-20240802-en
General
-
Target
WaveInstaller.exe
-
Size
55.9MB
-
MD5
521646f158f26a3790605f3c3ff47a5e
-
SHA1
a0fc21bf69705c2d8934e71841d5e803048b23b9
-
SHA256
a0fe8a8ecab5d9d7df5a364a95352e1d861c8ca851c4339b65aa4841b3619617
-
SHA512
c47839fe320cec955ea5abd331a47ec5bb39ed02e61c72b295272f01be57fdb0a361f124e2fe1b0f4f7326ed71542e5a42ada87b635a70e89ac2523ab50cb856
-
SSDEEP
393216:hxIdZflFnaY4nRSn3pPPa7uksiL2YS2xg5gC33QSau/puRDHbUXyZ8s:gdZflFnaTEKuu25e4daEgpbUXyms
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4616 created 2820 4616 BitLockerToGo.exe 49 -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 840 powershell.exe 1532 powershell.exe 1532 powershell.exe 840 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 driver1.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum WaveInstaller.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 WaveInstaller.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1212 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 4616 2296 driver1.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 1308 4616 WerFault.exe 93 1548 4616 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5048 wmic.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 17 Go-http-client/1.1 HTTP User-Agent header 15 Go-http-client/1.1 HTTP User-Agent header 16 Go-http-client/1.1 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1532 powershell.exe 1532 powershell.exe 840 powershell.exe 840 powershell.exe 4616 BitLockerToGo.exe 4616 BitLockerToGo.exe 2404 openwith.exe 2404 openwith.exe 2404 openwith.exe 2404 openwith.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2568 WaveInstaller.exe Token: SeIncreaseQuotaPrivilege 5048 wmic.exe Token: SeSecurityPrivilege 5048 wmic.exe Token: SeTakeOwnershipPrivilege 5048 wmic.exe Token: SeLoadDriverPrivilege 5048 wmic.exe Token: SeSystemProfilePrivilege 5048 wmic.exe Token: SeSystemtimePrivilege 5048 wmic.exe Token: SeProfSingleProcessPrivilege 5048 wmic.exe Token: SeIncBasePriorityPrivilege 5048 wmic.exe Token: SeCreatePagefilePrivilege 5048 wmic.exe Token: SeBackupPrivilege 5048 wmic.exe Token: SeRestorePrivilege 5048 wmic.exe Token: SeShutdownPrivilege 5048 wmic.exe Token: SeDebugPrivilege 5048 wmic.exe Token: SeSystemEnvironmentPrivilege 5048 wmic.exe Token: SeRemoteShutdownPrivilege 5048 wmic.exe Token: SeUndockPrivilege 5048 wmic.exe Token: SeManageVolumePrivilege 5048 wmic.exe Token: 33 5048 wmic.exe Token: 34 5048 wmic.exe Token: 35 5048 wmic.exe Token: 36 5048 wmic.exe Token: SeIncreaseQuotaPrivilege 5048 wmic.exe Token: SeSecurityPrivilege 5048 wmic.exe Token: SeTakeOwnershipPrivilege 5048 wmic.exe Token: SeLoadDriverPrivilege 5048 wmic.exe Token: SeSystemProfilePrivilege 5048 wmic.exe Token: SeSystemtimePrivilege 5048 wmic.exe Token: SeProfSingleProcessPrivilege 5048 wmic.exe Token: SeIncBasePriorityPrivilege 5048 wmic.exe Token: SeCreatePagefilePrivilege 5048 wmic.exe Token: SeBackupPrivilege 5048 wmic.exe Token: SeRestorePrivilege 5048 wmic.exe Token: SeShutdownPrivilege 5048 wmic.exe Token: SeDebugPrivilege 5048 wmic.exe Token: SeSystemEnvironmentPrivilege 5048 wmic.exe Token: SeRemoteShutdownPrivilege 5048 wmic.exe Token: SeUndockPrivilege 5048 wmic.exe Token: SeManageVolumePrivilege 5048 wmic.exe Token: 33 5048 wmic.exe Token: 34 5048 wmic.exe Token: 35 5048 wmic.exe Token: 36 5048 wmic.exe Token: SeDebugPrivilege 1212 tasklist.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeIncreaseQuotaPrivilege 672 wmic.exe Token: SeSecurityPrivilege 672 wmic.exe Token: SeTakeOwnershipPrivilege 672 wmic.exe Token: SeLoadDriverPrivilege 672 wmic.exe Token: SeSystemProfilePrivilege 672 wmic.exe Token: SeSystemtimePrivilege 672 wmic.exe Token: SeProfSingleProcessPrivilege 672 wmic.exe Token: SeIncBasePriorityPrivilege 672 wmic.exe Token: SeCreatePagefilePrivilege 672 wmic.exe Token: SeBackupPrivilege 672 wmic.exe Token: SeRestorePrivilege 672 wmic.exe Token: SeShutdownPrivilege 672 wmic.exe Token: SeDebugPrivilege 672 wmic.exe Token: SeSystemEnvironmentPrivilege 672 wmic.exe Token: SeRemoteShutdownPrivilege 672 wmic.exe Token: SeUndockPrivilege 672 wmic.exe Token: SeManageVolumePrivilege 672 wmic.exe Token: 33 672 wmic.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2568 wrote to memory of 5048 2568 WaveInstaller.exe 86 PID 2568 wrote to memory of 5048 2568 WaveInstaller.exe 86 PID 2568 wrote to memory of 1212 2568 WaveInstaller.exe 87 PID 2568 wrote to memory of 1212 2568 WaveInstaller.exe 87 PID 2568 wrote to memory of 1532 2568 WaveInstaller.exe 88 PID 2568 wrote to memory of 1532 2568 WaveInstaller.exe 88 PID 1532 wrote to memory of 840 1532 powershell.exe 89 PID 1532 wrote to memory of 840 1532 powershell.exe 89 PID 2568 wrote to memory of 672 2568 WaveInstaller.exe 90 PID 2568 wrote to memory of 672 2568 WaveInstaller.exe 90 PID 2568 wrote to memory of 2296 2568 WaveInstaller.exe 91 PID 2568 wrote to memory of 2296 2568 WaveInstaller.exe 91 PID 2568 wrote to memory of 2116 2568 WaveInstaller.exe 92 PID 2568 wrote to memory of 2116 2568 WaveInstaller.exe 92 PID 2296 wrote to memory of 4616 2296 driver1.exe 93 PID 2296 wrote to memory of 4616 2296 driver1.exe 93 PID 2296 wrote to memory of 4616 2296 driver1.exe 93 PID 2296 wrote to memory of 4616 2296 driver1.exe 93 PID 2296 wrote to memory of 4616 2296 driver1.exe 93 PID 4616 wrote to memory of 2404 4616 BitLockerToGo.exe 94 PID 4616 wrote to memory of 2404 4616 BitLockerToGo.exe 94 PID 4616 wrote to memory of 2404 4616 BitLockerToGo.exe 94 PID 4616 wrote to memory of 2404 4616 BitLockerToGo.exe 94 PID 4616 wrote to memory of 2404 4616 BitLockerToGo.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2820
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 4524⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 4764⤵
- Program crash
PID:1548
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4616 -ip 46161⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4616 -ip 46161⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD569c08e5d078bd287b3cb43b7c35bc831
SHA1307b8de9da4d24d474e44beaf4f32c15b258b0f6
SHA256ce3b888419f9e46029d630e56e15e64eb28b9f92652a1acf477a87a5aebe3f48
SHA5121bf71b7fc5e991dda21f6ed1c62895d5ba161b01677cba0901568df0a4bf3d6419cc3c04e83007566ee21de2cd66230af37de40b5ff61701ac4ad820a7b73152
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
119B
MD5052411e7391aa5b946a2e4704acac937
SHA1076644cf01f4f88ad27b2aa3255159ccf1bdc1b6
SHA256c95e085f42475222cc2b9f826603fefdc1a07c7dd09fc6b34b9b653bd9e941c2
SHA5125d7660f8226f3b73263125270b6a1188cad3301e8f2fa0355af9472cc71afe4dcd00fd8eff4057ff50a4fdb2d0064928123ff74043d12d761b546c2749d9e9a0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82