General
-
Target
Wave.exe
-
Size
83.9MB
-
Sample
250124-s7jjbsxlbm
-
MD5
6d5ed7a44e96bc0a50e0e694723bba78
-
SHA1
bda9c467e6d0ef552253e453aeee08a43c09b1f9
-
SHA256
7f5f60cae85f7bd49733c371942ad380928fac16c9d3f2e31459319705a1231e
-
SHA512
ddec21c27ba9a77ab14baa4e88307a8bf79b325eb9b7c63afda0a012fb38099424315939971399ed7349ff3d059b69aa28ed4338df68199498f3fe07349e2fe1
-
SSDEEP
1572864:qVjlGW4Fm7OkiqOv8im2AqlE7xlhpqfiYweyJulZUdg14Ead72:2InFm7OknOv8i3diLNpuB41Z2
Behavioral task
behavioral1
Sample
Wave.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wave.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Wave.exe
-
Size
83.9MB
-
MD5
6d5ed7a44e96bc0a50e0e694723bba78
-
SHA1
bda9c467e6d0ef552253e453aeee08a43c09b1f9
-
SHA256
7f5f60cae85f7bd49733c371942ad380928fac16c9d3f2e31459319705a1231e
-
SHA512
ddec21c27ba9a77ab14baa4e88307a8bf79b325eb9b7c63afda0a012fb38099424315939971399ed7349ff3d059b69aa28ed4338df68199498f3fe07349e2fe1
-
SSDEEP
1572864:qVjlGW4Fm7OkiqOv8im2AqlE7xlhpqfiYweyJulZUdg14Ead72:2InFm7OknOv8i3diLNpuB41Z2
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1