Overview
overview
7Static
static
3Wave-Setup.exe
windows7-x64
7Wave-Setup.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3resources/...ll.exe
windows7-x64
1resources/...ll.exe
windows10-2004-x64
1resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...rse.js
windows7-x64
3resources/...rse.js
windows10-2004-x64
3resources/...and.js
windows7-x64
3resources/...and.js
windows10-2004-x64
3resources/...lts.js
windows7-x64
3resources/...lts.js
windows10-2004-x64
3resources/...xec.js
windows7-x64
3resources/...xec.js
windows10-2004-x64
3resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...oad.js
windows7-x64
3resources/...oad.js
windows10-2004-x64
3resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
Wave-Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wave-Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
resources/app.asar.unpacked/node_modules/nodemon/bin/windows-kill.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
resources/app.asar.unpacked/node_modules/nodemon/bin/windows-kill.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/cli/index.js
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/cli/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/cli/parse.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/cli/parse.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/command.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/command.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/defaults.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/defaults.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/exec.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/exec.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/index.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/load.js
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/config/load.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/help/index.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/help/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/index.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/nodemon/lib/index.js
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
124.9MB
-
MD5
8323d339c17f7e6cd952e724db88ff91
-
SHA1
21539ecb01a473f3fd43ab15b15b16ff4662191e
-
SHA256
78ce5f5750a3757dfa1203940924dcf29958525ec99830de153f244b9cd4d1f8
-
SHA512
97253b4c345addc8d88feab5a4ddfd0663a5558b7a945921b83d3328f3cd331c9207b85cc115d0b2c29015c70dcc915775fdc52de3f4e37785121429eadff523
-
SSDEEP
3145728:WJkAzmogRUn/57SyAPgdg3ib33ohJH69WfKNZLZM+tpk5zRS:QkYjNR7SyANib33ovaNZLc5U
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2228 wrote to memory of 788 2228 cmd.exe 32 PID 2228 wrote to memory of 788 2228 cmd.exe 32 PID 2228 wrote to memory of 788 2228 cmd.exe 32 PID 788 wrote to memory of 2816 788 rundll32.exe 33 PID 788 wrote to memory of 2816 788 rundll32.exe 33 PID 788 wrote to memory of 2816 788 rundll32.exe 33 PID 2816 wrote to memory of 2168 2816 rundll32.exe 34 PID 2816 wrote to memory of 2168 2816 rundll32.exe 34 PID 2816 wrote to memory of 2168 2816 rundll32.exe 34 PID 2168 wrote to memory of 2944 2168 rundll32.exe 35 PID 2168 wrote to memory of 2944 2168 rundll32.exe 35 PID 2168 wrote to memory of 2944 2168 rundll32.exe 35 PID 2944 wrote to memory of 2572 2944 rundll32.exe 36 PID 2944 wrote to memory of 2572 2944 rundll32.exe 36 PID 2944 wrote to memory of 2572 2944 rundll32.exe 36 PID 2572 wrote to memory of 2392 2572 rundll32.exe 37 PID 2572 wrote to memory of 2392 2572 rundll32.exe 37 PID 2572 wrote to memory of 2392 2572 rundll32.exe 37 PID 2392 wrote to memory of 2628 2392 rundll32.exe 38 PID 2392 wrote to memory of 2628 2392 rundll32.exe 38 PID 2392 wrote to memory of 2628 2392 rundll32.exe 38 PID 2628 wrote to memory of 2856 2628 rundll32.exe 39 PID 2628 wrote to memory of 2856 2628 rundll32.exe 39 PID 2628 wrote to memory of 2856 2628 rundll32.exe 39 PID 2856 wrote to memory of 1244 2856 rundll32.exe 40 PID 2856 wrote to memory of 1244 2856 rundll32.exe 40 PID 2856 wrote to memory of 1244 2856 rundll32.exe 40 PID 1244 wrote to memory of 2748 1244 rundll32.exe 41 PID 1244 wrote to memory of 2748 1244 rundll32.exe 41 PID 1244 wrote to memory of 2748 1244 rundll32.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z6⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z7⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z8⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z9⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z10⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z11⤵
- Modifies registry class
PID:2748
-
-
-
-
-
-
-
-
-
-