Analysis
-
max time kernel
133s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/03/2023, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
wallpaper_engine 2.1.32.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
wallpaper_engine 2.1.32.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
installer.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
launcher.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
launcher.exe
Resource
win10v2004-20230220-en
General
-
Target
wallpaper_engine 2.1.32.rar
-
Size
240.1MB
-
MD5
499d980eba587d443fe6284db0e6c3a5
-
SHA1
94a51db6ba0ea7ae4e730a099d81fcce7522d6e6
-
SHA256
49e04b9e9874f1d648502fd990d8ce2e6f06727cd6b7c4334a99dabee0d3b586
-
SHA512
d13cc25cfcb6b31c60d423b2f082d6da0c1044e45eee129cc7c31c6abc27c999228e305f62e811b6e7f03d76e6307780c78209df3d4461bc4ef5c02402ea4bfe
-
SSDEEP
6291456:j1lROS+GQcKaScRgb4pvFww+qm/4ZO2aDcUF3pz5CwvRxRFcy6JxZ:j/D+LSeovf+H482icupz5CwJxRFHwxZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 824 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 824 vlc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 824 vlc.exe 824 vlc.exe 824 vlc.exe 824 vlc.exe 824 vlc.exe 824 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 824 vlc.exe 824 vlc.exe 824 vlc.exe 824 vlc.exe 824 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 824 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1184 1512 cmd.exe 28 PID 1512 wrote to memory of 1184 1512 cmd.exe 28 PID 1512 wrote to memory of 1184 1512 cmd.exe 28 PID 1184 wrote to memory of 824 1184 rundll32.exe 29 PID 1184 wrote to memory of 824 1184 rundll32.exe 29 PID 1184 wrote to memory of 824 1184 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\wallpaper_engine 2.1.32.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wallpaper_engine 2.1.32.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wallpaper_engine 2.1.32.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:824
-
-