Analysis
-
max time kernel
32s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
windows_wallpaper.dll
Resource
win10v2004-20231215-en
General
-
Target
windows_wallpaper.dll
-
Size
261KB
-
MD5
065fc90b295bf1e508512c8cee3c7713
-
SHA1
e7c04a0424f1079b0f79ebaaf737e4f5458e2d30
-
SHA256
01ee2a5ca31c9fd8fd5584b9b971263457b9c9388b7206963557d884687e5b73
-
SHA512
53563cfa1dcbdea03b74bdb6154ff635c12c3922f09c18ad56f4715f6c8a02bfa5a2ec071033465c8f9b5ced8ca00a5c4118b1eb75fabfd60a03dadc2dff7299
-
SSDEEP
3072:C0E+XfB1GKd/Pq6/Okg15ZLMvTcF1jjS1pE8V4f46ZgLdj6nGycH6My+:CsdaGOBZgvT6XypES40jFT6
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 1100 rundll32.exe 3 1100 rundll32.exe 3 1100 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4744 set thread context of 1100 4744 rundll32.exe 84 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529582367588217" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1100 4744 rundll32.exe 84 PID 4744 wrote to memory of 1100 4744 rundll32.exe 84 PID 4744 wrote to memory of 1100 4744 rundll32.exe 84 PID 2072 wrote to memory of 4284 2072 chrome.exe 87 PID 2072 wrote to memory of 4284 2072 chrome.exe 87 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 2628 2072 chrome.exe 91 PID 2072 wrote to memory of 4956 2072 chrome.exe 92 PID 2072 wrote to memory of 4956 2072 chrome.exe 92 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95 PID 2072 wrote to memory of 4232 2072 chrome.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\windows_wallpaper.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\system32\rundll32.exerundll32.exe2⤵
- Blocklisted process makes network request
PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd05979758,0x7ffd05979768,0x7ffd059797782⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:22⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:12⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4616 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1824,i,11356724856636400344,12565837617218002736,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52d65ddb9a77bcf87f37c9a6407ead5fb
SHA1617eb8e9db7f11ce2fcd06ecac2702fff12c1f07
SHA256b2a6ecc9c22570c9a4e0352139ef1567f909e7f888dbcf31f5db719915ba0f41
SHA51252bbae8824fc6e2607e8befcdfa988dba17decc6f96b4b0c40f1ad07c3308a8e36c338b20cb40060420056232e8007d117823309f8c7d2f1ae02b69f94fc17a4
-
Filesize
371B
MD53316d7f53735967a5703967f969013da
SHA107a13d7398a485d8666d2daf726b7007fde17571
SHA25615f26c2beacdba100a2d4de886ae085077f7dcbde292d742a34b7c9460c40955
SHA51235242181ed378911ce749c7c05b78fd250e9f978e5229ba726d0e36ece17098db5a836b192a21d7d68eaa7e3fd964f7eb414740e90c5f06539f621427046086e
-
Filesize
6KB
MD5c92e4d6e89a0c001d0c79d5b6d58b480
SHA1ef0abc56941d9a026dc3bcfea4fb979069395b81
SHA25674a58063c6379455c497a9e1789167449a84f42541e5a97459b8673518c8eaa6
SHA512a83a874cab3c26ed82d8f4a26b31a6568bfea5e06f26da2ae4d71f1db010520cfc68840b6a4196e7c1902249df7653121438707820a7cd6c72eafd35fd9f420f
-
Filesize
6KB
MD595bd4ddf30da89935e3923ff011113c1
SHA1d84e6f3e881904e0d37cc4a5c0ffe45215bbb006
SHA256ef40554a324c0c010a0d117819c022bc1823b30b94a126ec9b0052130ad4dd7a
SHA51221bd9eb9e9d2d5d6d2bdecef3ef973cf585527f233ab7a5cf7a5c5dd8afb96767310394aebfe15934b034a66f8af25f63494f4fbcc9b4018e469ccc5ffcae5cd
-
Filesize
15KB
MD565aa9150c5109b88bbce00ff29d3ef23
SHA10cc7878ffbb8a4e6ad3d1bcc1a0028fe3b5b2f84
SHA2569b993956cfac20103f3e3e86a896a40d99feee08707e23b4044cd80ee32e5c8e
SHA512b47d26646d89fab0b1b8b627cf8ef524323ca09d8f758f723266aa78193e01968953b42f47974060b4f02e3ce9dbd429c791d563461b3ed945b5dd82542daa26
-
Filesize
242KB
MD59ad4fa88d7f9185acacf1d26240f6a79
SHA1ba5441a95be3e83e17a71f9bb70514f23ace75c6
SHA256130daab19c95d2e029b0a48ea13b8cf1daeca5caefea519d41227854bb98e50c
SHA512cb94f8f2049f3593d7d9ad07327c0a3245be782eaf9204e4560d895504be6159acce2a5f0e72eb9d18ed61b078f789e4d47c831d1d47c29cfaa7bd607d578961
-
Filesize
115KB
MD5ec4a8b87f4ef44df4a2752a90f61feea
SHA11fb3e87176a087c343b732126f155bcc638c45fd
SHA256ce8696fda270fa6350b1c80a10bcdf8893fc5ad04da05fc24a071790095e687d
SHA51241b5174ef8deefbfb9a804da6f1f3be07dc1c09daa6cff02fe16c9be3626571641cacfff2e353864a63f5401d741ec67ad9b6d53c6c4c5ae32ce1a04d5b28f50
-
Filesize
242KB
MD5a0acf0232c7877fa42ad53fb9395367b
SHA177c59e423bf46a4a2f527eb7eb6b9fc39588e206
SHA25624a58db735b6391ebb0ca120fff5c024948b5fbd2848c736d368c52ae3a245b3
SHA5128740916c6939bee5551096fc9241911f0a9d5d5e24f38494de41fedc2b7c8a39df7de36aee7ac8304d5a0559a3210374972ac3cea67c2297288ce24274abb59f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd