Resubmissions

25-04-2023 20:18

230425-y3j7yscg23 10

Analysis

  • max time kernel
    482s
  • max time network
    487s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 20:18

General

  • Target

    Executables/WALLPAPER.cmd

  • Size

    2KB

  • MD5

    a32722ee00e08c05a3effb3d1215baa9

  • SHA1

    e480cef2dc06d46d5bb18d20c77cbf750a20ac45

  • SHA256

    b98263cea6af6eea2d561c840cf14a1c775ec4e6bedeb975833889c51a9fe591

  • SHA512

    6255ce91f4c1a7c9c325f1e0a0339791ae3ca8891a638def98042da627110524b5c19a1bc66b84121085f211d1162a81f6330e88b0539f5010fda2f0a1a2dd18

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executables\WALLPAPER.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" type "C:\Windows\Resources\Themes\aero.theme" "
      2⤵
        PID:1852
      • C:\Windows\system32\findstr.exe
        findstr /c:"AppMode="
        2⤵
          PID:2044
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell -NoP -C "$Content = (Get-Content 'C:\Windows\Resources\Themes\aero.theme'); $Content = $Content -replace 'Wallpaper=%SystemRoot%.*', 'Wallpaper=%SystemRoot%\web\wallpaper\Windows\atlas-dark.jpg'; $Content = $Content -replace 'SystemMode=.*', """"SystemMode=Dark`nAppMode=Dark"""" | Set-Content 'C:\Windows\Resources\Themes\aero.theme'"
          2⤵
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4284
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c reg query "HKEY_USERS" | findstr /r /x /c:"HKEY_USERS\\S-.*" /c:"HKEY_USERS\\AME_UserHive_[^_]*"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Windows\system32\reg.exe
            reg query "HKEY_USERS"
            3⤵
              PID:2564
            • C:\Windows\system32\findstr.exe
              findstr /r /x /c:"HKEY_USERS\\S-.*" /c:"HKEY_USERS\\AME_UserHive_[^_]*"
              3⤵
                PID:1664
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" | findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3136
              • C:\Windows\system32\reg.exe
                reg query "HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData"
                3⤵
                  PID:2624
                • C:\Windows\system32\findstr.exe
                  findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                  3⤵
                    PID:4024
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" | findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1624
                  • C:\Windows\system32\reg.exe
                    reg query "HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData"
                    3⤵
                      PID:3568
                    • C:\Windows\system32\findstr.exe
                      findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                      3⤵
                        PID:32
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" | findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:216
                      • C:\Windows\system32\reg.exe
                        reg query "HKU\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData"
                        3⤵
                          PID:100
                        • C:\Windows\system32\findstr.exe
                          findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                          3⤵
                            PID:1420
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          PowerShell -NoP -C "Add-Type -AssemblyName System.Drawing; $img = New-Object System.Drawing.Bitmap 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper'; if ($img.Flags -ne 77840) {exit 1}; if ($img.HorizontalResolution -ne 96) {exit 1}; if ($img.VerticalResolution -ne 96) {exit 1}; if ($img.PropertyIdList -notcontains 40961) {exit 1}; if ($img.PropertyIdList -notcontains 20624) {exit 1}; if ($img.PropertyIdList -notcontains 20625) {exit 1}"
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4196
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" | findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2224
                          • C:\Windows\system32\reg.exe
                            reg query "HKU\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData"
                            3⤵
                              PID:1880
                            • C:\Windows\system32\findstr.exe
                              findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                              3⤵
                                PID:1348
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" | findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4880
                              • C:\Windows\system32\reg.exe
                                reg query "HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData"
                                3⤵
                                  PID:732
                                • C:\Windows\system32\findstr.exe
                                  findstr /r /x /c:".*AppData[ ]*REG_SZ[ ].*"
                                  3⤵
                                    PID:4136

                              Network

                              MITRE ATT&CK Matrix

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                2KB

                                MD5

                                6cf293cb4d80be23433eecf74ddb5503

                                SHA1

                                24fe4752df102c2ef492954d6b046cb5512ad408

                                SHA256

                                b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                SHA512

                                0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                1KB

                                MD5

                                227556da5e65f6819f477756808c17e4

                                SHA1

                                6ffce766e881ca2a60180bb25f4981b183f78279

                                SHA256

                                101f5fe8a4192f14e9f0a12c105ca81c9f176860930af44747185dd1bedb59a4

                                SHA512

                                d46b935809d2c4b7a041ad790f2db11c0a808df022c91ae9152b8769021b884fde49653a7a46557ef9ee65e274fe0b6c8503df9b50e6b3b849fefacf51f8bd6a

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q4o15d03.czp.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • memory/4196-159-0x000001666C3D0000-0x000001666C3E0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4196-160-0x000001666C3D0000-0x000001666C3E0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4196-161-0x000001666C3D0000-0x000001666C3E0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4284-140-0x0000025235A80000-0x0000025235AA2000-memory.dmp

                                Filesize

                                136KB

                              • memory/4284-143-0x000002521B6C0000-0x000002521B6D0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4284-144-0x000002521B6C0000-0x000002521B6D0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4284-145-0x000002521B6C0000-0x000002521B6D0000-memory.dmp

                                Filesize

                                64KB