Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-08-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WaveInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
opengl32.dll
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
opengl32.dll
Resource
win10v2004-20240802-en
General
-
Target
WaveInstaller.exe
-
Size
62.8MB
-
MD5
f66c85401d7db71dabac1967d5b25b22
-
SHA1
8856046029a881b6bd79b68328eaccaacf0ec60e
-
SHA256
2e2540ebf685f0afa10ce24de9e2780baf01c57f22e5c5b238277159d76daa6f
-
SHA512
6bd058d33fb27c493ad8a974bc1c07770da01293191c499677d9205ecf035005e0f8f5c60a39e979de84465b89cd01abd6204ea3d13ff2bfdf069f1f40957a79
-
SSDEEP
393216:1KiyQ5GnKGtcq4kHylkvE0xD8pJJT6CmfeazN6wNRMMWEpTP1uVP7r1R:3yQ5GnKGtcQwkvXg5TABzVUENP01
Malware Config
Extracted
rhadamanthys
https://147.45.44.156/9fcc2685c3ccafd/5ltcujso.q8pi8
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegAsm.exedescription pid Process procid_target PID 4944 created 2504 4944 RegAsm.exe 41 -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid Process 4436 powershell.exe 3884 powershell.exe 4436 powershell.exe 3884 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
driver1.exepid Process 4608 driver1.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
WaveInstaller.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum WaveInstaller.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 WaveInstaller.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
driver1.exedescription pid Process procid_target PID 4608 set thread context of 4944 4608 driver1.exe 82 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1564 4944 WerFault.exe 82 3680 4944 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
openwith.exedriver1.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language driver1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 HTTP User-Agent header 1 Go-http-client/1.1 HTTP User-Agent header 2 Go-http-client/1.1 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exeRegAsm.exeopenwith.exepid Process 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 3884 powershell.exe 3884 powershell.exe 3884 powershell.exe 4944 RegAsm.exe 4944 RegAsm.exe 512 openwith.exe 512 openwith.exe 512 openwith.exe 512 openwith.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exetasklist.exepowershell.exedescription pid Process Token: SeIncreaseQuotaPrivilege 4988 wmic.exe Token: SeSecurityPrivilege 4988 wmic.exe Token: SeTakeOwnershipPrivilege 4988 wmic.exe Token: SeLoadDriverPrivilege 4988 wmic.exe Token: SeSystemProfilePrivilege 4988 wmic.exe Token: SeSystemtimePrivilege 4988 wmic.exe Token: SeProfSingleProcessPrivilege 4988 wmic.exe Token: SeIncBasePriorityPrivilege 4988 wmic.exe Token: SeCreatePagefilePrivilege 4988 wmic.exe Token: SeBackupPrivilege 4988 wmic.exe Token: SeRestorePrivilege 4988 wmic.exe Token: SeShutdownPrivilege 4988 wmic.exe Token: SeDebugPrivilege 4988 wmic.exe Token: SeSystemEnvironmentPrivilege 4988 wmic.exe Token: SeRemoteShutdownPrivilege 4988 wmic.exe Token: SeUndockPrivilege 4988 wmic.exe Token: SeManageVolumePrivilege 4988 wmic.exe Token: 33 4988 wmic.exe Token: 34 4988 wmic.exe Token: 35 4988 wmic.exe Token: 36 4988 wmic.exe Token: SeIncreaseQuotaPrivilege 4988 wmic.exe Token: SeSecurityPrivilege 4988 wmic.exe Token: SeTakeOwnershipPrivilege 4988 wmic.exe Token: SeLoadDriverPrivilege 4988 wmic.exe Token: SeSystemProfilePrivilege 4988 wmic.exe Token: SeSystemtimePrivilege 4988 wmic.exe Token: SeProfSingleProcessPrivilege 4988 wmic.exe Token: SeIncBasePriorityPrivilege 4988 wmic.exe Token: SeCreatePagefilePrivilege 4988 wmic.exe Token: SeBackupPrivilege 4988 wmic.exe Token: SeRestorePrivilege 4988 wmic.exe Token: SeShutdownPrivilege 4988 wmic.exe Token: SeDebugPrivilege 4988 wmic.exe Token: SeSystemEnvironmentPrivilege 4988 wmic.exe Token: SeRemoteShutdownPrivilege 4988 wmic.exe Token: SeUndockPrivilege 4988 wmic.exe Token: SeManageVolumePrivilege 4988 wmic.exe Token: 33 4988 wmic.exe Token: 34 4988 wmic.exe Token: 35 4988 wmic.exe Token: 36 4988 wmic.exe Token: SeDebugPrivilege 4676 tasklist.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeIncreaseQuotaPrivilege 4436 powershell.exe Token: SeSecurityPrivilege 4436 powershell.exe Token: SeTakeOwnershipPrivilege 4436 powershell.exe Token: SeLoadDriverPrivilege 4436 powershell.exe Token: SeSystemProfilePrivilege 4436 powershell.exe Token: SeSystemtimePrivilege 4436 powershell.exe Token: SeProfSingleProcessPrivilege 4436 powershell.exe Token: SeIncBasePriorityPrivilege 4436 powershell.exe Token: SeCreatePagefilePrivilege 4436 powershell.exe Token: SeBackupPrivilege 4436 powershell.exe Token: SeRestorePrivilege 4436 powershell.exe Token: SeShutdownPrivilege 4436 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeSystemEnvironmentPrivilege 4436 powershell.exe Token: SeRemoteShutdownPrivilege 4436 powershell.exe Token: SeUndockPrivilege 4436 powershell.exe Token: SeManageVolumePrivilege 4436 powershell.exe Token: 33 4436 powershell.exe Token: 34 4436 powershell.exe Token: 35 4436 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
WaveInstaller.exepowershell.exedriver1.exeRegAsm.exedescription pid Process procid_target PID 1728 wrote to memory of 4988 1728 WaveInstaller.exe 75 PID 1728 wrote to memory of 4988 1728 WaveInstaller.exe 75 PID 1728 wrote to memory of 4676 1728 WaveInstaller.exe 76 PID 1728 wrote to memory of 4676 1728 WaveInstaller.exe 76 PID 1728 wrote to memory of 4436 1728 WaveInstaller.exe 77 PID 1728 wrote to memory of 4436 1728 WaveInstaller.exe 77 PID 4436 wrote to memory of 3884 4436 powershell.exe 79 PID 4436 wrote to memory of 3884 4436 powershell.exe 79 PID 1728 wrote to memory of 2344 1728 WaveInstaller.exe 80 PID 1728 wrote to memory of 2344 1728 WaveInstaller.exe 80 PID 1728 wrote to memory of 4608 1728 WaveInstaller.exe 81 PID 1728 wrote to memory of 4608 1728 WaveInstaller.exe 81 PID 1728 wrote to memory of 4608 1728 WaveInstaller.exe 81 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4608 wrote to memory of 4944 4608 driver1.exe 82 PID 4944 wrote to memory of 512 4944 RegAsm.exe 83 PID 4944 wrote to memory of 512 4944 RegAsm.exe 83 PID 4944 wrote to memory of 512 4944 RegAsm.exe 83 PID 4944 wrote to memory of 512 4944 RegAsm.exe 83 PID 4944 wrote to memory of 512 4944 RegAsm.exe 83 PID 1728 wrote to memory of 3304 1728 WaveInstaller.exe 87 PID 1728 wrote to memory of 3304 1728 WaveInstaller.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2504
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:2344
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 6204⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 6284⤵
- Program crash
PID:3680
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:3304
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD5768db31a3b1b4b64db81653736c527af
SHA107230323cfefea1933496aab82b4936080c715f5
SHA256a1d839c90cd068deb5ad638f79822d0aeb669bbf44e9c3c3aaf0a9ca0fdcd653
SHA5121433d165e86f9ed020dd467c2c778a4c5854be32546a9f7b3ed0098bfd5410dd995f23272d13b99256685ebed27dfe708b88be251ffef8c8971c4fff542d1b6a
-
Filesize
3KB
MD57033adcdceef2520521477b094e52cc7
SHA16dbdc3aba745a40a79f2eb659f2b427aaf5ff62e
SHA256bb10a63597ebc56a9c5e558c7b5bed8c1dde4856f7604ab987998d10eda3ac4e
SHA512af9249bd6a64e28d1b03ce962618ce2a7e5a55dc57d1dbc8efcf2e4142e74f40e58b144952981c3a86771a9fd207e73986130edf7b7dfde2495347e284e8287e
-
Filesize
720B
MD548d3a13096b697b0a1fc14874e2c9d02
SHA15e8a5c64cae7fbb24379b641628e0291de1d16da
SHA25631ec403ec21a01a148c51122bf8593a5a3535af0e2472861b8bfd56ce1f255e9
SHA51264d66a64333d2b9f0dd791ce65c9e17952404b81dca3c85713edca46b27fe149b30c1252a68e8d0038e295059de208350144da06fb615ed89d3a79b5ac14a88a
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a