Analysis
-
max time kernel
138s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WaveInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
opengl32.dll
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
opengl32.dll
Resource
win10v2004-20240802-en
General
-
Target
WaveInstaller.exe
-
Size
62.8MB
-
MD5
f66c85401d7db71dabac1967d5b25b22
-
SHA1
8856046029a881b6bd79b68328eaccaacf0ec60e
-
SHA256
2e2540ebf685f0afa10ce24de9e2780baf01c57f22e5c5b238277159d76daa6f
-
SHA512
6bd058d33fb27c493ad8a974bc1c07770da01293191c499677d9205ecf035005e0f8f5c60a39e979de84465b89cd01abd6204ea3d13ff2bfdf069f1f40957a79
-
SSDEEP
393216:1KiyQ5GnKGtcq4kHylkvE0xD8pJJT6CmfeazN6wNRMMWEpTP1uVP7r1R:3yQ5GnKGtcQwkvXg5TABzVUENP01
Malware Config
Extracted
rhadamanthys
https://147.45.44.156/9fcc2685c3ccafd/5ltcujso.q8pi8
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegAsm.exedescription pid Process procid_target PID 3132 created 2912 3132 RegAsm.exe 50 -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid Process 3308 powershell.exe 4060 powershell.exe 3308 powershell.exe 4060 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
driver1.exepid Process 1004 driver1.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
WaveInstaller.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum WaveInstaller.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 WaveInstaller.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
driver1.exedescription pid Process procid_target PID 1004 set thread context of 3132 1004 driver1.exe 98 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1092 3132 WerFault.exe 98 3960 3132 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
driver1.exeRegAsm.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language driver1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 21 Go-http-client/1.1 HTTP User-Agent header 22 Go-http-client/1.1 HTTP User-Agent header 23 Go-http-client/1.1 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exeRegAsm.exeopenwith.exepid Process 3308 powershell.exe 3308 powershell.exe 4060 powershell.exe 4060 powershell.exe 3132 RegAsm.exe 3132 RegAsm.exe 3432 openwith.exe 3432 openwith.exe 3432 openwith.exe 3432 openwith.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exetasklist.exepowershell.exepowershell.exewmic.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2664 wmic.exe Token: SeSecurityPrivilege 2664 wmic.exe Token: SeTakeOwnershipPrivilege 2664 wmic.exe Token: SeLoadDriverPrivilege 2664 wmic.exe Token: SeSystemProfilePrivilege 2664 wmic.exe Token: SeSystemtimePrivilege 2664 wmic.exe Token: SeProfSingleProcessPrivilege 2664 wmic.exe Token: SeIncBasePriorityPrivilege 2664 wmic.exe Token: SeCreatePagefilePrivilege 2664 wmic.exe Token: SeBackupPrivilege 2664 wmic.exe Token: SeRestorePrivilege 2664 wmic.exe Token: SeShutdownPrivilege 2664 wmic.exe Token: SeDebugPrivilege 2664 wmic.exe Token: SeSystemEnvironmentPrivilege 2664 wmic.exe Token: SeRemoteShutdownPrivilege 2664 wmic.exe Token: SeUndockPrivilege 2664 wmic.exe Token: SeManageVolumePrivilege 2664 wmic.exe Token: 33 2664 wmic.exe Token: 34 2664 wmic.exe Token: 35 2664 wmic.exe Token: 36 2664 wmic.exe Token: SeIncreaseQuotaPrivilege 2664 wmic.exe Token: SeSecurityPrivilege 2664 wmic.exe Token: SeTakeOwnershipPrivilege 2664 wmic.exe Token: SeLoadDriverPrivilege 2664 wmic.exe Token: SeSystemProfilePrivilege 2664 wmic.exe Token: SeSystemtimePrivilege 2664 wmic.exe Token: SeProfSingleProcessPrivilege 2664 wmic.exe Token: SeIncBasePriorityPrivilege 2664 wmic.exe Token: SeCreatePagefilePrivilege 2664 wmic.exe Token: SeBackupPrivilege 2664 wmic.exe Token: SeRestorePrivilege 2664 wmic.exe Token: SeShutdownPrivilege 2664 wmic.exe Token: SeDebugPrivilege 2664 wmic.exe Token: SeSystemEnvironmentPrivilege 2664 wmic.exe Token: SeRemoteShutdownPrivilege 2664 wmic.exe Token: SeUndockPrivilege 2664 wmic.exe Token: SeManageVolumePrivilege 2664 wmic.exe Token: 33 2664 wmic.exe Token: 34 2664 wmic.exe Token: 35 2664 wmic.exe Token: 36 2664 wmic.exe Token: SeDebugPrivilege 2940 tasklist.exe Token: SeDebugPrivilege 3308 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeIncreaseQuotaPrivilege 3268 wmic.exe Token: SeSecurityPrivilege 3268 wmic.exe Token: SeTakeOwnershipPrivilege 3268 wmic.exe Token: SeLoadDriverPrivilege 3268 wmic.exe Token: SeSystemProfilePrivilege 3268 wmic.exe Token: SeSystemtimePrivilege 3268 wmic.exe Token: SeProfSingleProcessPrivilege 3268 wmic.exe Token: SeIncBasePriorityPrivilege 3268 wmic.exe Token: SeCreatePagefilePrivilege 3268 wmic.exe Token: SeBackupPrivilege 3268 wmic.exe Token: SeRestorePrivilege 3268 wmic.exe Token: SeShutdownPrivilege 3268 wmic.exe Token: SeDebugPrivilege 3268 wmic.exe Token: SeSystemEnvironmentPrivilege 3268 wmic.exe Token: SeRemoteShutdownPrivilege 3268 wmic.exe Token: SeUndockPrivilege 3268 wmic.exe Token: SeManageVolumePrivilege 3268 wmic.exe Token: 33 3268 wmic.exe Token: 34 3268 wmic.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
WaveInstaller.exepowershell.exedriver1.exeRegAsm.exedescription pid Process procid_target PID 3196 wrote to memory of 2664 3196 WaveInstaller.exe 87 PID 3196 wrote to memory of 2664 3196 WaveInstaller.exe 87 PID 3196 wrote to memory of 2940 3196 WaveInstaller.exe 88 PID 3196 wrote to memory of 2940 3196 WaveInstaller.exe 88 PID 3196 wrote to memory of 3308 3196 WaveInstaller.exe 89 PID 3196 wrote to memory of 3308 3196 WaveInstaller.exe 89 PID 3308 wrote to memory of 4060 3308 powershell.exe 90 PID 3308 wrote to memory of 4060 3308 powershell.exe 90 PID 3196 wrote to memory of 3268 3196 WaveInstaller.exe 94 PID 3196 wrote to memory of 3268 3196 WaveInstaller.exe 94 PID 3196 wrote to memory of 1004 3196 WaveInstaller.exe 96 PID 3196 wrote to memory of 1004 3196 WaveInstaller.exe 96 PID 3196 wrote to memory of 1004 3196 WaveInstaller.exe 96 PID 1004 wrote to memory of 704 1004 driver1.exe 97 PID 1004 wrote to memory of 704 1004 driver1.exe 97 PID 1004 wrote to memory of 704 1004 driver1.exe 97 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 1004 wrote to memory of 3132 1004 driver1.exe 98 PID 3132 wrote to memory of 3432 3132 RegAsm.exe 100 PID 3132 wrote to memory of 3432 3132 RegAsm.exe 100 PID 3132 wrote to memory of 3432 3132 RegAsm.exe 100 PID 3132 wrote to memory of 3432 3132 RegAsm.exe 100 PID 3132 wrote to memory of 3432 3132 RegAsm.exe 100 PID 3196 wrote to memory of 4404 3196 WaveInstaller.exe 109 PID 3196 wrote to memory of 4404 3196 WaveInstaller.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2912
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 6084⤵
- Program crash
PID:1092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 6044⤵
- Program crash
PID:3960
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3132 -ip 31321⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3132 -ip 31321⤵PID:1392
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD5768db31a3b1b4b64db81653736c527af
SHA107230323cfefea1933496aab82b4936080c715f5
SHA256a1d839c90cd068deb5ad638f79822d0aeb669bbf44e9c3c3aaf0a9ca0fdcd653
SHA5121433d165e86f9ed020dd467c2c778a4c5854be32546a9f7b3ed0098bfd5410dd995f23272d13b99256685ebed27dfe708b88be251ffef8c8971c4fff542d1b6a
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82