File name:

WaveRoblox.zip

Full analysis: https://app.any.run/tasks/0290818b-53f3-4433-8efa-b65d365d4aa5
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 20, 2024, 23:56:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
generic
arch-exec
arch-doc
evasion
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

EFA79B80F5C2AF4D6788574C733B124F

SHA1:

480A28151518AA999B80E559854890BAEE40FEA1

SHA256:

71F2B3DD516FAD1981205078F607F4E39761D2D2047FC2595D4F36779C736652

SSDEEP:

98304:R/hqP05w4jpkqXAHQ6KlCRSbk+cyD5WUwzIcTJQcBZ5uWTY67g7cy0WiU5meAKVi:ChV6fm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • WinRAR.exe (PID: 6352)
    • Actions looks like stealing of personal data

      • WaveExecutor.exe (PID: 7076)
    • Steals credentials from Web Browsers

      • WaveExecutor.exe (PID: 7076)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6352)
    • Reads security settings of Internet Explorer

      • WaveExecutor.exe (PID: 7076)
    • Checks Windows Trust Settings

      • WaveExecutor.exe (PID: 7076)
    • Checks for external IP

      • WaveExecutor.exe (PID: 7076)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 6352)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6352)
    • Manual execution by a user

      • WaveExecutor.exe (PID: 7076)
      • WaveExecutor.exe (PID: 7024)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6352)
    • Reads the computer name

      • WaveExecutor.exe (PID: 7076)
    • Checks supported languages

      • WaveExecutor.exe (PID: 7076)
    • Checks proxy server information

      • WaveExecutor.exe (PID: 7076)
    • Reads the machine GUID from the registry

      • WaveExecutor.exe (PID: 7076)
    • Creates files or folders in the user directory

      • WaveExecutor.exe (PID: 7076)
    • Reads the software policy settings

      • WaveExecutor.exe (PID: 7076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2021:04:09 05:49:14
ZipCRC: 0x485720c4
ZipCompressedSize: 841645
ZipUncompressedSize: 1871256
ZipFileName: d3d9.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GENERIC winrar.exe waveexecutor.exe no specs waveexecutor.exe

Process information

PID
CMD
Path
Indicators
Parent process
6352"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\WaveRoblox.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7024"C:\Users\admin\Desktop\WaveExecutor.exe" C:\Users\admin\Desktop\WaveExecutor.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\waveexecutor.exe
c:\windows\system32\ntdll.dll
7076"C:\Users\admin\Desktop\WaveExecutor.exe" C:\Users\admin\Desktop\WaveExecutor.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\waveexecutor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\imm32.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
2 328
Read events
2 307
Write events
21
Delete events
0

Modification events

(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\WaveRoblox.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
4
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.28998\d3d9.dllexecutable
MD5:7B7447B345BE7891C781915FFB1F4DCE
SHA256:91E0B91A628C32113DBFFD820CBE219A55F54D68B4AEDBDCC849C70EE3772223
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.28998\d3dx9_24.dllexecutable
MD5:B165DF72E13E6AF74D47013504319921
SHA256:1EC422BD6421C741EEF57847260967F215913649901E21DD9C46EB1B3BB10906
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.28998\WaveExecutor.exeexecutable
MD5:20530C9BC61569E79D6FFECE7F7E426A
SHA256:76DBAC3DC4D2DC8AA1E0E8DE0D8F4D57172A8BE90FC3EF535159EF649D762DD5
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.28998\vcruntime140_1.dllexecutable
MD5:EB49C1D33B41EB49DFED58AAFA9B9A8F
SHA256:6D3A6CDE6FC4D3C79AABF785C04D2736A3E2FD9B0366C9B741F054A13ECD939E
7076WaveExecutor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:67E486B2F148A3FCA863728242B6273E
SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.28998\readme.txttext
MD5:272B7564A16F9A855E53ACE52EEDABB5
SHA256:B8DFA4C4DD3B936577BAC953058EDF5546D94557BBE2C10045240CF3CCBED3E2
7076WaveExecutor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:85C708A50A530419B50A05C0F8696966
SHA256:A57EF0EAADFCD583FA0CA496FD711E1494F18F7F27FC58E8972B60A43639A051
7076WaveExecutor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:3C4C6663CA7DEB4D452136B90214E6CE
SHA256:B94F2F864EC4B8FD8FB443025A427CE81D333A9FDD9CC7216711C59B98C5968F
7076WaveExecutor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
34
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7076
WaveExecutor.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
7076
WaveExecutor.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1344
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1344
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.129:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.bing.com
  • 104.126.37.129
  • 104.126.37.139
  • 104.126.37.128
  • 104.126.37.123
  • 104.126.37.178
  • 104.126.37.154
  • 104.126.37.163
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.76
  • 40.126.32.72
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.20
  • 20.190.160.17
  • 20.190.160.14
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
api.myip.com
  • 172.67.75.163
  • 104.26.9.59
  • 104.26.8.59
whitelisted
c.pki.goog
  • 142.250.186.99
whitelisted

Threats

PID
Process
Class
Message
7076
WaveExecutor.exe
Device Retrieving External IP Address Detected
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
No debug info