Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 00:06

General

  • Target

    Wave Goodbye.exe

  • Size

    6.0MB

  • MD5

    b67c09157b260b02037a716d28d7c34f

  • SHA1

    a6da5549351e78fda395b5381dcf9e14240390fd

  • SHA256

    ceb6a0b8e1c27c75155ab28b9283fe488ae5daca15b0cc58ebfc009200c8e824

  • SHA512

    61cc65311af74f83ea950ef54661a5421df67026f7760e257ae3701b3b339f554ac1b42a63f2adafe142ad71a81c545b6749aac0a4f5c78eccd90d072fb7bbad

  • SSDEEP

    98304:dHx3rQ9UT/cnDEuzHEAtpW1pAT0WaDMyaATQKC2witrFr9vQVN9x3gHWdFISYft4:73rpbcnDEuzkAtpWzATIaAEHVYJJmN/P

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wave Goodbye.exe
    "C:\Users\Admin\AppData\Local\Temp\Wave Goodbye.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/6NNYUEXAR2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ce052b2ea1634e569a2fb0eb248e9aba

    SHA1

    400d19241e4a2655bfba559456d32c3f6f1e4de3

    SHA256

    4cab104013bae3b41140dd61e31edf7df16c3c4d888ecb04065ab4e9f38d4e98

    SHA512

    54f7548ccd22334f61f0884ed9966bd4e28556b50a9d18312bc93a3679ac0ac766e9309dd3f90d1bdabd437488c50f54496cdcdad9d0b522ef887595da6bf21b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b2e31706e972ffb9b69228b3251c5164

    SHA1

    a569f14512ceb6fcf28da9f8b2da761b792fc818

    SHA256

    411f7db30b0bd92fafb60d2fd4cee1d5368ad5947d15a00582a91cfda8128a44

    SHA512

    c09dc0d28d227d30b6901bdaccf76424e56de9d4c183a73a2a3ad216c2e84b902bfe72eef773fc265cdb795b4b73533a00fe89bfe721ba0189e3e99062c5b9e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    1a80fdaa14444821e89ca98c43627c9e

    SHA1

    9da2de9bb30cd14ae6d67ff1c0a423a621921683

    SHA256

    e3f3be7cbca8177edb8045e7aa87a41bf35f3f5f52a5061320b9f30ebb0a0e04

    SHA512

    f9e0b1b917890769b8a24b68af6d046ceb5f79cb05c3e52e871753cef1afc0e796335119dfe8e1ee15063e484676297896f4bbab6bfd506eaec363ed476ec5df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fd1471e0ae18d092adc58098a515bc6d

    SHA1

    2dcc0e959e5ffb5316ad04ace17f908404ce1cef

    SHA256

    fa8098b035f4a452b598212267085e47aeaae60d83c2a1b9e5e23d91258ab035

    SHA512

    db5e171aac355e0c2fb599bf58d37dfbe8d71c2846d8d7dfc142c97e1b2731b5fee698c6c0793a80ddbb1a3c6632189760b8ea345fb6f8b9819ca4089a1035dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c43bbaf3489ae9b0adb7753d3eb46132

    SHA1

    cc7d6eb63ce114c3f5b6cbf1f40c6486b01caba0

    SHA256

    6aadfb0bef18adaa93e3ab5de91389f1f1b0129f3a8d6360e5492eb39737db25

    SHA512

    f598755d8029decf3175e07cf1c4e5fb9563c0904c174024976a59f5ccd56c7206aeea774bf7f5ea0872e72c1772cdc94314ad716109aa3ff0acb794e5350804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5c368de9a583287020ff22d1bea14b0e

    SHA1

    2e0dc90bfc8c318ffe6f67e1ea1b8ae258d42f7b

    SHA256

    52ec2c45033af4cb502e1f050fa886cd5e4dd33a9fc29b3fa7bdb757358ffcef

    SHA512

    11afe5dc25a7cf2fda359a240f7a9b24ef3bcbf864ca3cd51ea92d3940dc9a481ab51db85025b39c7d38f28f2ae5ea3a2e0be3d7b08c0ae15ac6e2da68e71765

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2a07b34c95ef339d526a51c43064b90a

    SHA1

    8e5e486673840d1d5c7ada2303ceb91794b212ae

    SHA256

    67c1be425bf6e712c006be483860dcb006bac53063e018788eee7a29b6eda253

    SHA512

    dd4e26a33046ec5be6589d7680710da6d1c9afa77833e5ed8d9e219830c1e9454ba9cdf8557f1b423e414d8afa19f26cc73935b8955e9be41ae020d6d43a8afb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2af7476fdc4e8f2a96f122fe2bf58ffe

    SHA1

    c624eb184a863da50afaab0cee695314ac713a8e

    SHA256

    0be1fb1bd1b2d5f1feb145c5e6a6dda9ca3f125c7f3f04be76220f2b3dd492e9

    SHA512

    2df997a304a23b600ae2cc0c6b0e4a6b1b7fdc8db3821e635bb4b25275f176dc137bdfcda6bd2f1a1bfa989ee2f908d8c346e6adc67097526ccb15489295ec85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fce7035af0023d0da04138c0d04c6047

    SHA1

    cc9e0f7a9fd5cbb725d58b9729072af2333edad0

    SHA256

    6cb0406732035a700b28c2de76a62866466ac198c7c43cb05e959061092270cd

    SHA512

    9509d62f2bb3afaae0a84606625050b143fac565f394abcbab5a3c672dcbafbde6a5239b02eadb08408b945665ba42c760e7f6f9431c4b4a58f88601b9dbf96d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    906d64b7dfe0dd447cdf75d311d1b357

    SHA1

    5d58de2fd43e711752b7489fbe41f9d4e12d7e61

    SHA256

    e17c574b3f33c5ec15907c7e4f21917d455c082b765e9dd53cf82695d0a7c271

    SHA512

    e86cefb13c2c4382288556da21f1a7a45e99fe60d40e024c456ebcd69b27452ebb682668f6b9ec4282fcd28c67e7ec9582ca20d334766ab107ad09b6ce336a18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    8854ddb992673b69d47ff74d25ce5a8b

    SHA1

    8c7fe1167fcb554da61b91bcb840af920713aa91

    SHA256

    922d0e1c983034830a12bb9349e13d4dd266612fcb99a2e72767187e0a5ca283

    SHA512

    e80283e3312a0d380c8f446dc3b42bc812f40fb94937687cb91b65805815abeb3f556cbc15928ed4b39fa5281eacc4a42cad28f5248404600e6a4ab8173d5f73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    9604f18ebe04d7bccc3357658b481e11

    SHA1

    36df4174272ac5cf1cb3281984deda7144d9c05d

    SHA256

    9b95ff2341e2f87a7cbfd8e4730b524de613c9800002660428a8eaa2b0cd151c

    SHA512

    75532c2fb32ffcfd2f2d4a108114f4a8521b0999e287d569b01f7eca695e659ab7471df7452cbbd46451dd4b26c71904b8ccc5c21d3175cae703e092ad6d2eb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    195a3d5fbbaffdce2f5aaefd8bc4d8e5

    SHA1

    4a24a75179fa98a9534aaa3a4cc7409c8cf70e09

    SHA256

    3545a289dce1ce21b488a1471b5f1b4ee84dc1aa7761c8837cc69963cd330556

    SHA512

    8a2a735368d660c11f626ba444eca09bf657385b1f4c464d343f66a3eb8bc04d3c3096cb0a7e10a18560d7083c0ae21c3de1aea080f7c2afa41fa53360428a7f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\leccqyn\imagestore.dat
    Filesize

    24KB

    MD5

    be4e595e0238e1189b0717d4a5b186bf

    SHA1

    64c20ddc593f09355a3386c51b1ab345b942dc6a

    SHA256

    3ce9823117ee0971b6bbd13e692e64998469f67bce9a7350ee3f0b7725573801

    SHA512

    3f9e185b4838685f4492f6730fca2d8cffe8c818ccd79a68c9f9313dc759ed3411cc20f0dc0e37be193895f70231143a2ff2a5c4da1228f687a15f590634c7ab

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\favicon[2].ico
    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab24B2.tmp
    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\Tar2574.tmp
    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

  • C:\Users\Admin\AppData\Local\Temp\~DF8E85FCCC7C23DB4B.TMP
    Filesize

    16KB

    MD5

    f2ca1bee3fb07ba42578c11711268391

    SHA1

    e07cdaf9bd267085bf8366a8d4bfdbfa8ac9af9e

    SHA256

    5cb607bacb662ae09fd96b81e1d9c4f2db385c5943b29cd9aa726d132df0dc60

    SHA512

    40c148035eeef467672f2a478620df23f7e81145dc4a9f095b9de36aadaa9c86ade4b830476c56f8c1eba70884a69c09088a3d9a209414ce6b8d045af05c8744

  • memory/2136-3-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-6-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-113-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-2-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-5-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-4-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-0-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2136-1-0x0000000076FB0000-0x0000000076FB2000-memory.dmp
    Filesize

    8KB

  • memory/2136-523-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB