Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-09-2024 06:51

General

  • Target

    WaveWindows.exe

  • Size

    172.5MB

  • MD5

    30f269a8a4a5f5e1d0a10cb4ea43b738

  • SHA1

    672dd7bdf8dfaf7442c210a5acbea829916a7873

  • SHA256

    bb74a49ede11683d120fbc193c88cbf0681f61450c3290f842f6b7435b4c97ea

  • SHA512

    c8e0c35f18cd59c731090d51bd234e74d7d269f0006c75e3fa49e03a0a825f66568ec946bb714957554fe227f7b3fc6d3eda0968547b95a8d8c8d27c02567cf6

  • SSDEEP

    1572864:6V00dKoWtUBaArjpGI2O6QMsjI1RaZjVdiX5H5z8GTzXts3XYpfLW5q:Lgrm7i5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe
    "C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "NET SESSION"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:344
      • C:\Windows\system32\net.exe
        NET SESSION
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 SESSION
          4⤵
            PID:3664
      • C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe
        "C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\wave-electron" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1768,i,16526157090625622894,17076662431645600430,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:2
        2⤵
          PID:3656
        • C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe
          "C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\wave-electron" --standard-schemes=app --secure-schemes=app --field-trial-handle=2156,i,16526157090625622894,17076662431645600430,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2116 /prefetch:11
          2⤵
            PID:4388
          • C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe
            "C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\wave-electron" --standard-schemes=app --secure-schemes=app --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2416,i,16526157090625622894,17076662431645600430,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2412 /prefetch:1
            2⤵
              PID:1060
            • C:\Users\Admin\AppData\Local\Temp\resources\node_modules\language-server\wave-luau.exe
              C:\Users\Admin\AppData\Local\Temp\resources\node_modules\language-server\wave-luau.exe lsp --definitions=C:\Users\Admin\AppData\Local\Temp\resources\node_modules\language-server\globalTypes.d.luau --definitions=C:\Users\Admin\AppData\Local\Temp\resources\node_modules\language-server\wave.d.luau --docs=C:\Users\Admin\AppData\Local\Temp\resources\node_modules\language-server\en-us.json
              2⤵
                PID:2708
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\KasperskyLab" /v Session"
                2⤵
                  PID:4820
                  • C:\Windows\system32\reg.exe
                    C:\Windows\system32\reg.exe QUERY "HKCU\Software\KasperskyLab" /v Session
                    3⤵
                    • Checks for any installed AV software in registry
                    PID:3076
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -Command Start-Process -FilePath & "C:\Users\Admin\AppData\Local\Temp\bin\ClientManager.exe" -Verb RunAs -WorkingDirectory "C:\Users\Admin\AppData\Local\Temp\bin" -NoNewWindow -Wait -WindowStyle Hidden"
                  2⤵
                  • Hide Artifacts: Hidden Window
                  PID:2044
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe -NoProfile -ExecutionPolicy Bypass -Command Start-Process -FilePath
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:680
                  • C:\Users\Admin\AppData\Local\Temp\bin\ClientManager.exe
                    "C:\Users\Admin\AppData\Local\Temp\bin\ClientManager.exe" -Verb RunAs -WorkingDirectory "C:\Users\Admin\AppData\Local\Temp\bin" -NoNewWindow -Wait -WindowStyle Hidden
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Access Token Manipulation: Create Process with Token
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4112
                • C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe
                  "C:\Users\Admin\AppData\Local\Temp\WaveWindows.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\wave-electron" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=168,i,16526157090625622894,17076662431645600430,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3944 /prefetch:10
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4484

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2y34ycso.lhd.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\bin\ClientManager.exe

                Filesize

                21.6MB

                MD5

                0992b1eeef7450b8bc151cfe5a578f61

                SHA1

                9cb6b223d6fa8f0d29a7fa6e58ff5f757640c780

                SHA256

                068436912f008a35341b99be12c8af407cfccc4950fec63b59d88c0aa5c431f2

                SHA512

                4ee7d380c31145601b2031ee1b68ac31ac2eed0d63af7db1615b3dcf92b99e17a3110156ea6ba9ba1e8ba632bfbf8697428cb99183d7977a67a3258e9a2178b7

              • C:\Users\Admin\AppData\Local\Temp\bin\config.json

                Filesize

                388B

                MD5

                98d76379e7044b833e18491e322a0bfb

                SHA1

                cc5c927fb5fbcf32b1a019783e23a519fb21d2a9

                SHA256

                4793e9c5f9e10e49b7525c83a0e85e03afa5067aff322513db4481259617b404

                SHA512

                2de2e839117a9d9b8cb611fb9708a8cb988b5e9b6843217f9c85ffe90a0772a51bf5fe48b8749e99537b6e59066eadd31f7dd25120b6806b575073ba80fe3ad4

              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • C:\Users\Admin\AppData\Roaming\wave-electron\Network\Network Persistent State

                Filesize

                375B

                MD5

                b62eeb738eed5c4ee866e7bb72edb11e

                SHA1

                319744168c9cf7229823eaba4cd3c3c9d62973f4

                SHA256

                965c963e542ac5f9283d8323e58d03908b73da313dd3fd62e43ce8632541650d

                SHA512

                15006afb5e63f6296474fe6046de37a8023cfef1b6809086fa79c66d6ffe7dc8b311109713d14294b2f814dacc62def3cad8dfb0070fd04c169f91a6ef3d478b

              • C:\Users\Admin\AppData\Roaming\wave-electron\Network\Network Persistent State~RFe58e26c.TMP

                Filesize

                59B

                MD5

                2800881c775077e1c4b6e06bf4676de4

                SHA1

                2873631068c8b3b9495638c865915be822442c8b

                SHA256

                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                SHA512

                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

              • memory/680-92-0x0000024560140000-0x0000024560162000-memory.dmp

                Filesize

                136KB

              • memory/1060-31-0x00007FFB3A740000-0x00007FFB3A741000-memory.dmp

                Filesize

                4KB

              • memory/1060-81-0x000002073D830000-0x000002073D91A000-memory.dmp

                Filesize

                936KB

              • memory/1060-30-0x00007FFB3C780000-0x00007FFB3C781000-memory.dmp

                Filesize

                4KB

              • memory/4112-102-0x00007FFB3C9D0000-0x00007FFB3C9D2000-memory.dmp

                Filesize

                8KB

              • memory/4112-103-0x00007FFB3C9E0000-0x00007FFB3C9E2000-memory.dmp

                Filesize

                8KB

              • memory/4112-104-0x00007FF76D440000-0x00007FF76F751000-memory.dmp

                Filesize

                35.1MB

              • memory/4484-128-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-129-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-127-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-133-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-135-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-139-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-138-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-137-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-136-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB

              • memory/4484-134-0x000001CA7FC00000-0x000001CA7FC01000-memory.dmp

                Filesize

                4KB