Analysis

  • max time kernel
    107s
  • max time network
    292s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 22:57

General

  • Target

    wallpaper_engine/assets/effects/blend/preview/effects/transform/effect.json

  • Size

    381B

  • MD5

    374696ff7fa53d1dae69706c8d8bf9a6

  • SHA1

    75a41ae0b790a5579b002a5c5aef80a6f2f73929

  • SHA256

    48d113161ba395ad565c50a8d45d9a3807be8912c6430fecbe6f7ff03eb4dc00

  • SHA512

    8404ef6a7eac1b98166956d8ab4414158a6f8ac0feedb5a8791818fa8ac1f3430bd71e8a435471a3e1c8217e8e74a0c2a2cef83c67c9b2d2bd4afd2835867536

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\wallpaper_engine\assets\effects\blend\preview\effects\transform\effect.json
    1⤵
    • Modifies registry class
    PID:1612
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:812

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads