Resubmissions
30-01-2025 06:53
250130-hnt6ls1rb1 1030-01-2025 06:51
250130-hmx6wa1rat 1030-01-2025 06:45
250130-hh5p6a1pgt 10Analysis
-
max time kernel
29s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 06:45
Behavioral task
behavioral1
Sample
Wave.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Wave.exe
Resource
win10v2004-20250129-en
General
-
Target
Wave.exe
-
Size
9.8MB
-
MD5
708932216a4a65b3e560893a115673f2
-
SHA1
e9aeef34258854948f50f1c6bbd8eb69772d0e59
-
SHA256
a3d7cd217684a58df277f072e1b7e1a4e00448f1b7530fdae13af3903d1327a5
-
SHA512
78ce6826fa7d3d561ce69d395b62e5178ab7333a510652b614fa7864ac61bf3901a07d49b39bd43968f5f54ef6f04fd9c6aa7af7a435d05c1a3833bf61272992
-
SSDEEP
196608:QNnP/g2ys0VxNQMiLP8qJEdHvHMeNxHFJMIDJ+gsAGKkRWyHEWzsT:/JBukqJEdPHTlFqy+gs1WYzs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2016 Wave.exe -
resource yara_rule behavioral1/files/0x0005000000019623-47.dat upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2016 2312 Wave.exe 30 PID 2312 wrote to memory of 2016 2312 Wave.exe 30 PID 2312 wrote to memory of 2016 2312 Wave.exe 30 PID 2736 wrote to memory of 2676 2736 chrome.exe 33 PID 2736 wrote to memory of 2676 2736 chrome.exe 33 PID 2736 wrote to memory of 2676 2736 chrome.exe 33 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1832 2736 chrome.exe 35 PID 2736 wrote to memory of 1232 2736 chrome.exe 36 PID 2736 wrote to memory of 1232 2736 chrome.exe 36 PID 2736 wrote to memory of 1232 2736 chrome.exe 36 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37 PID 2736 wrote to memory of 2840 2736 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wave.exe"C:\Users\Admin\AppData\Local\Temp\Wave.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Wave.exe"C:\Users\Admin\AppData\Local\Temp\Wave.exe"2⤵
- Loads dropped DLL
PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70a9758,0x7fef70a9768,0x7fef70a97782⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:22⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:12⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1568 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:22⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3212 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1948
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f417688,0x13f417698,0x13f4176a83⤵PID:2192
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3720 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:12⤵PID:296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1112 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1068 --field-trial-handle=1356,i,2777026768010703867,17773949102462176480,131072 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5c64faa1a789e7075e6f19d9a43fb3c5a
SHA1208ca886c174e317c3705f6011cc66d58923f1c8
SHA256532e9b3489fdccd6eecfc95eb45fc204c35e2408d2c62bbdcc3c1c3209f2144a
SHA5129d5aff2dda120dcf7a63ac68d2b5a55d03a542a83a49022feb60487ebe744f10886ecf3207aeabb12d72d6e17d3ce72c60012e32b3e1821287224456b2a1ef1c
-
Filesize
214KB
MD5ba958dfa97ba4abe328dce19c50cd19c
SHA1122405a9536dd824adcc446c3f0f3a971c94f1b1
SHA2563124365e9e20791892ee21f47763d3df116763da0270796ca42fd63ecc23c607
SHA512aad22e93babe3255a7e78d9a9e24c1cda167d449e5383bb740125445e7c7ddd8df53a0e53705f4262a49a307dc54ceb40c66bab61bec206fbe59918110af70bf
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
359B
MD59a4d90bcb8004208acffbe8fa316418d
SHA1f52f216d16aabd478f910f5432434e9691dea4e0
SHA256ec9babbfca7acc15aea128a89e7d72cac38004a547957bc33c83b09f2c24b8be
SHA512365ead3824ac6ae3754b1eb6c1fa3c47156bebbb902c5cec3be575f151bed47685e8b7c00ad93fbb93806bfc1f0e4b3a3e1202e10051927b2a5658bab03fc0fd
-
Filesize
5KB
MD5f22379dbfcb4f4d81def0d0c1f6a77e8
SHA1271fe2ead1c6610a2e51e7d17c99f5b3d8f9a50a
SHA2561d9e95c2fc100364c0987852471eede4ce588d00454feab2b8572a82da5916f7
SHA5122fe025c6b89c6ad36a63708182a6e4aad668f69ab28c2538b1d6af0da849db45bc6949c22ceeee19f168acb704588809bad899a4763ec560606fd177eb4b6cad
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
358KB
MD54686b8f692470e21e5a4e2e19522bdde
SHA14b2e83f34958de8e9ac3106cbea572c90b0f8880
SHA256eb10df9f2b3d8abeb4e432975202142fa45f131005ca6fe19883da5ff382cd42
SHA51233cc8b140c264b5d0b29d02fdbcdd62899231d835cb2e3450a10d98360c45229403ac1981282425011b6a74b476fdd2eae65e8e35f30aef7203b462cc7f049cc
-
Filesize
1.4MB
MD5fc7bd515b12e537a39dc93a09b3eaad6
SHA196f5d4b0967372553cb106539c5566bc184f6167
SHA256461e008b7cdf034f99a566671b87849772873a175aefec6ed00732976f5c4164
SHA512a8433d5b403f898e4eeebd72fce08ebad066ca60aeb0b70e2ae78377babc2acbbae2ac91ab20f813cce4b1dc58c2ad6b3868f18cc8ac0fe7be2bff020eb73122