Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    67s
  • max time network
    68s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/08/2024, 07:17

General

  • Target

    https://cdn.discordapp.com/attachments/1265453420102287371/1265695217315610716/wave-crack.zip?ex=66b43e47&is=66b2ecc7&hm=91b013bf59e72d4acfae07cbc9f57426981a09a6f4cd3c8cebf82aa0dfcd5583&

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://cdn.discordapp.com/attachments/1265453420102287371/1265695217315610716/wave-crack.zip?ex=66b43e47&is=66b2ecc7&hm=91b013bf59e72d4acfae07cbc9f57426981a09a6f4cd3c8cebf82aa0dfcd5583&"
    1⤵
      PID:4056
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4696
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:5092
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4176
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1916
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3588
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1972
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3856
      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack\wave-server.exe
        "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack\wave-server.exe"
        1⤵
        • Modifies registry class
        PID:2064
      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack\assets\WaveBootstrapper.exe
        "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack\assets\WaveBootstrapper.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        PID:812
      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack\assets\WaveWindows.exe
        "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack\assets\WaveWindows.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2172

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XBLEDSOP\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\wave-crack.zip.mqvn7cf.partial

        Filesize

        14.0MB

        MD5

        d019aeb1083489eb74966c22135a994c

        SHA1

        fc46905adc87de7514f3c7e2d362777407b80aaa

        SHA256

        f9d82cf6982aa8048ea57431bcd865fa1caa8e63cd630422845d4fbc85f58c31

        SHA512

        a26cbed9c2ba123859739e8b9d55ac11f5cfbd90302b3ad26c430571ab695276d14d3ad4c9885ae80360d7fae74a0d5e623bd945e68a683c28c4681d0c1ef5be

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NQR0ZD29\wave-crack[1].zip

        Filesize

        426KB

        MD5

        85a6cd332c294229cfd92adbe99bfac9

        SHA1

        3d34b9432fdb916fea9753a515927dd3cba99081

        SHA256

        e90e82ffa48c696eeac54821e0dba2c2e82854cfab270ba0c103f42d73f7d364

        SHA512

        93c1807d93ae2306cdd8e5a8fe6f49e3a30b828207c8b6ef74e6b862be703c4d167e5e3cf4f690171ff407d9330c99e7e03aa461b139d1cae9a92e3a12fc7aa3

      • memory/1972-72-0x00000119E0C00000-0x00000119E0D00000-memory.dmp

        Filesize

        1024KB

      • memory/3588-64-0x0000020244590000-0x0000020244592000-memory.dmp

        Filesize

        8KB

      • memory/3588-58-0x0000020244540000-0x0000020244542000-memory.dmp

        Filesize

        8KB

      • memory/3588-56-0x0000020234410000-0x0000020234510000-memory.dmp

        Filesize

        1024KB

      • memory/3588-62-0x0000020244570000-0x0000020244572000-memory.dmp

        Filesize

        8KB

      • memory/4696-16-0x000001DC3B620000-0x000001DC3B630000-memory.dmp

        Filesize

        64KB

      • memory/4696-35-0x000001DC3A850000-0x000001DC3A852000-memory.dmp

        Filesize

        8KB

      • memory/4696-115-0x000001DC427E0000-0x000001DC427E1000-memory.dmp

        Filesize

        4KB

      • memory/4696-114-0x000001DC427D0000-0x000001DC427D1000-memory.dmp

        Filesize

        4KB

      • memory/4696-0-0x000001DC3B520000-0x000001DC3B530000-memory.dmp

        Filesize

        64KB