Analysis

  • max time kernel
    55s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 03:06

General

  • Target

    Wave Goodbye.exe

  • Size

    6.0MB

  • MD5

    b67c09157b260b02037a716d28d7c34f

  • SHA1

    a6da5549351e78fda395b5381dcf9e14240390fd

  • SHA256

    ceb6a0b8e1c27c75155ab28b9283fe488ae5daca15b0cc58ebfc009200c8e824

  • SHA512

    61cc65311af74f83ea950ef54661a5421df67026f7760e257ae3701b3b339f554ac1b42a63f2adafe142ad71a81c545b6749aac0a4f5c78eccd90d072fb7bbad

  • SSDEEP

    98304:dHx3rQ9UT/cnDEuzHEAtpW1pAT0WaDMyaATQKC2witrFr9vQVN9x3gHWdFISYft4:73rpbcnDEuzkAtpWzATIaAEHVYJJmN/P

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wave Goodbye.exe
    "C:\Users\Admin\AppData\Local\Temp\Wave Goodbye.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/6NNYUEXAR2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2548

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5b23a620e126bec8d665dec8903e27a8

    SHA1

    be8c71e8a1692cfe71c539bd82dfd71f92eb73a3

    SHA256

    df72c8e631542052dc1a5250723c594031b6462c25ac7d57ad63ba9de5e20281

    SHA512

    38cfc62a564ee415a790799926c8d4f2631b6a7a6d3387792fa330b390bed19c1f5e630d7389f65a17bc4cf7358d83fcf640ccdacf400ac76f24b48d3eb0dd34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    307175572f41bac3317f84155f239315

    SHA1

    3df53e2e3f4cc754c30a751edb06d4aefd203dd9

    SHA256

    9a6c9cf1804fadedc8186de6ebb63db1fee8fffafdf2fc678412e67de6476118

    SHA512

    421de291c891a40e741299131078c5760bf80e3578770931cdc5d272b2c43ea2e523df9f80624bb0074ebae1ca79c8236ac3da39246635e1b41fe2c4b3fcaca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bcffe66068aa82a25c293196b992cb6c

    SHA1

    3767246d9875e8b3c0fafd3244bf18d6057a6b4e

    SHA256

    0e04d4042f4a9ae584358c7f979aad5c90f8298381e395daff16c083eb4151b9

    SHA512

    26f301862546894a95358c235170b59a2115bdbe821ed94fc464fea21dbf2f277145f853f45ac1fcc63ac0c89d0d9ae078095d8a2217f7d3efe39933b7b92060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    96bcfd7c31452b40366d2f234b1a8f56

    SHA1

    3465728beb0a28ae8aa7d1f44607db6de62737b5

    SHA256

    9d37deb838f3b4b11e3d40ed35f711d3aa12c6040851f998213dc327d4bade3c

    SHA512

    27c5065bdb1c23f2f26f9698a3be49bf3bd8a974da9a12ab598e901d5d116702607f7333309e0d3b8082d891d6fce2b0ffb4ad90771d6e50678463194302afc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ba2c374755ffc1de5d1705c3d763d283

    SHA1

    133e06c524b6f8ceef750eb44bae003be6b7863b

    SHA256

    bdbd7f8cee6f20bd0c60a8355cb9ecc370e33d4df7e4cc6f91edcb96d4638004

    SHA512

    3dfd79fba064f6cf8e66431d589529f11e0bc09fb7013f00279e4a1b26934be69642ee0c5291c0859d52e1c0bbea9d22c3d6e556b07b64d0eeac645e359aa1f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3f2f60bc40436b98ca993d72d1fd46eb

    SHA1

    bcd91b71643879b5ed6297412f6c28824a1f0c1d

    SHA256

    1e8c4735edf32cac63c97d10bd01b62b28dfb4615417decc6e89ca2be76d0579

    SHA512

    b164e4727825160eb6061eba003fa1c9cf23105882f67e003b1b13eb183f048c472c5f41a345ae2473cf5f6a7589a891313cbcd8bd71835f5d9d945c16e86eb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    54ab7848497a205bd2f3781cdb0baa39

    SHA1

    d210f9d5e9eb48db9242f8698d2deb96f0724a8b

    SHA256

    394169e9af65bc84bee1377f9bf57b6086287f483c161f3c5aabecea5b308394

    SHA512

    8ebb5dd21213b3885cd638bc9c40a80a5ac511f890c22d4810ade91ea8792f066896df01acbd3734980fac37a9e34ebb0f5862b26055a9dae7b128cd7139ee7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6b3638c073138c95060f9cab80f6ad73

    SHA1

    83d87b9869737d56b82bb5ba220cb1df94373ff4

    SHA256

    0cc0a54a6752c1bf80107ac36d43cba24ee25ab47554cb1689d803dc9eb0e152

    SHA512

    58ec33b7797838ea878494a6460a7d385b9c9452391e43b5acd06bc2786eecb49eb658cf0ba57d7eea3281d38b418d9bafe518e21596857df66ae8498165a896

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ae66c857922ab3a8b3034893efa65d18

    SHA1

    729f49946934c1f4fb56bdf7f3ff51028b3438a3

    SHA256

    2091957179ce894f73ea31e12cf2944d50fd5f9600c67f07826fb0313bbd3ede

    SHA512

    b67c73540ee8b8a3721898944f426841ca47c8085276c9a9148e4354e08d155987b9295e72d221092daf73165c85c8ee5a10394a5d82957a78483a419c0a3ef5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    56fe6f4c79d0c02ff0c6f28bdc424e23

    SHA1

    5aeacd788af8c5b1a8f320a88cd33c61dbc0115c

    SHA256

    f785f79de2baf2b9882fc9c4f383fb8acab1609592ebfdaf07f3a523b03137b4

    SHA512

    f6307867f0b2de3d9d67fdcd1e465e47828844dbc6ec36c2dd1a5969e73abbb8b21819c4002ae01e415efbc5478227ea8e9f630e1f79212f7f02aa4c5921c2d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5eb0d715389585f8f86831310a916d1d

    SHA1

    182f193244a097ec46e5b74237cae4e8c1a4fc92

    SHA256

    46277e711c74ac3c23d92d56acfce5ebe84d19a3d071a3e7c37a92d1626ff184

    SHA512

    d8919d304d06aa4c19a415db6cc8bcd262357b70b3fb2d71dde4d9a2cc098681ffd3f27234d9314afb69238d0dd3a7b1302848a5e372e493ef3ac2f5bd9b1076

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7d349212f841028414222380298087ae

    SHA1

    bad020ae55e564533665355e983dc823d8554bb6

    SHA256

    3289c672571bd831587d5a43e31b31348053f69e85b87cdcb7b2d8592b7adfc5

    SHA512

    749009a776cbbc38bc0319a296af54e28599a344540589af94f45566cd9e570128ce7eaa84683e4bc86b692c7f3846b8bd224f94fccea77930acc3ae5eac47f7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jw2rl61\imagestore.dat
    Filesize

    24KB

    MD5

    652538fbcc09f588a6bb9c516c0a0902

    SHA1

    4987c6357dd49eab95f60d25e956db60d2085bcf

    SHA256

    35f7aad9f0ffa8c87af3f8c800766abfaaa932b2e46394529cd2c2b5bb32b5ac

    SHA512

    fc4d62f010bbc19f8f6e5b5d81128154be9677de1e7a5fe9cfc57a8b1563b0acb1a9cc4c12102b06c08b28bb302adfb8a9cd246deab285692609bd7e599cf374

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\favicon[1].ico
    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab5F30.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6033.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2872-5-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-110-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-7-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-4-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-0-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-6-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-2-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-3-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-1-0x0000000077460000-0x0000000077462000-memory.dmp
    Filesize

    8KB

  • memory/2872-583-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-586-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB

  • memory/2872-587-0x0000000140000000-0x0000000140F65000-memory.dmp
    Filesize

    15.4MB