Overview
overview
8Static
static
3Wallpaper....up.exe
windows7-x64
8Wallpaper....up.exe
windows10-2004-x64
8Wallpaper....up.exe
windows7-x64
7Wallpaper....up.exe
windows10-2004-x64
7Wallpaper....up.exe
windows7-x64
7Wallpaper....up.exe
windows10-2004-x64
7Wallpaper....st.exe
windows7-x64
7Wallpaper....st.exe
windows10-2004-x64
6Wallpaper....64.exe
windows7-x64
7Wallpaper....64.exe
windows10-2004-x64
7Wallpaper....86.exe
windows7-x64
7Wallpaper....86.exe
windows10-2004-x64
7Wallpaper....64.exe
windows7-x64
7Wallpaper....64.exe
windows10-2004-x64
7Wallpaper....86.exe
windows7-x64
7Wallpaper....86.exe
windows10-2004-x64
7Wallpaper....st.msi
windows7-x64
6Wallpaper....st.msi
windows10-2004-x64
6Analysis
-
max time kernel
123s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
Wallpaper.Engine.v2.4.55/Wallpaper.Engine.v2.4.55/thirdparty/MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Wallpaper.Engine.v2.4.55/Wallpaper.Engine.v2.4.55/thirdparty/MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Wallpaper.Engine.v2.4.55/_Redist/dotNetFx40_Full_setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Wallpaper.Engine.v2.4.55/_Redist/dotNetFx40_Full_setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Wallpaper.Engine.v2.4.55/_Redist/dxwebsetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Wallpaper.Engine.v2.4.55/_Redist/dxwebsetup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Wallpaper.Engine.v2.4.55/_Redist/oalinst.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Wallpaper.Engine.v2.4.55/_Redist/oalinst.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_2015-2019_x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_2015-2019_x64.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_2015-2019_x86.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_2015-2019_x86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_x64.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_x64.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_x86.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Wallpaper.Engine.v2.4.55/_Redist/vcredist_x86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Wallpaper.Engine.v2.4.55/_Redist/xnafx40_redist.msi
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
Wallpaper.Engine.v2.4.55/_Redist/xnafx40_redist.msi
Resource
win10v2004-20240508-en
General
-
Target
Wallpaper.Engine.v2.4.55/_Redist/dxwebsetup.exe
-
Size
281KB
-
MD5
fd6057b33e15a553ddc5d9873723ce8f
-
SHA1
f90efb623b5abea70af63c470daa8674444fb1df
-
SHA256
111aeddc6a6dbf64b28cb565aa12af9ee3cc0a56ce31e4da0068cf6b474c3288
-
SHA512
d894630c9a4bdb767e9f16d1b701acbdf011e721768ba0dc7a24e6d82a4d062a7ca253b1b334edba38c06187104351203a92c017838bdd9f13905cde30f7d94d
-
SSDEEP
6144:pWK8EGMUjp5cGQ3Mek1B3B9h8Ins3i8AEYBSawz1YSc:JGvjp5cj35kDB9hrs3zARBSaJSc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 220 dxwsetup.exe -
Loads dropped DLL 3 IoCs
pid Process 220 dxwsetup.exe 220 dxwsetup.exe 220 dxwsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: dxwsetup.exe File opened (read-only) \??\H: dxwsetup.exe File opened (read-only) \??\I: dxwsetup.exe File opened (read-only) \??\N: dxwsetup.exe File opened (read-only) \??\J: dxwsetup.exe File opened (read-only) \??\S: dxwsetup.exe File opened (read-only) \??\U: dxwsetup.exe File opened (read-only) \??\M: dxwsetup.exe File opened (read-only) \??\O: dxwsetup.exe File opened (read-only) \??\P: dxwsetup.exe File opened (read-only) \??\Q: dxwsetup.exe File opened (read-only) \??\A: dxwsetup.exe File opened (read-only) \??\E: dxwsetup.exe File opened (read-only) \??\K: dxwsetup.exe File opened (read-only) \??\L: dxwsetup.exe File opened (read-only) \??\T: dxwsetup.exe File opened (read-only) \??\Y: dxwsetup.exe File opened (read-only) \??\X: dxwsetup.exe File opened (read-only) \??\Z: dxwsetup.exe File opened (read-only) \??\G: dxwsetup.exe File opened (read-only) \??\R: dxwsetup.exe File opened (read-only) \??\V: dxwsetup.exe File opened (read-only) \??\W: dxwsetup.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\directx\websetup\SETA99E.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\SETA9AE.tmp dxwsetup.exe File created C:\Windows\SysWOW64\directx\websetup\SETA9AE.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup32.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\DirectX\WebSetup\filelist.dat dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\dxupdate.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\SETA99E.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\DirectX\WebSetup dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup.dll dxwsetup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\msdownld.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57C1A0.tmp\dxupdate.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57C1A0.tmp\dxupdate.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57C1A0.tmp dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log dxwsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2956 wrote to memory of 220 2956 dxwebsetup.exe 88 PID 2956 wrote to memory of 220 2956 dxwebsetup.exe 88 PID 2956 wrote to memory of 220 2956 dxwebsetup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wallpaper.Engine.v2.4.55\_Redist\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\Wallpaper.Engine.v2.4.55\_Redist\dxwebsetup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD50a23038ea472ffc938366ef4099d6635
SHA16499d741776dc4a446c22ea11085842155b34176
SHA2568f2c455c9271290dcde2f68589cf825f9134beecb7e8b7e2ecbcabeab792280a
SHA512dcc1c2ea86fd3a7870cd0369fa42f63d493895c546dcdd492ee19079a0d0696d689bbfe7b686d4fa549841896a54e673fc4581b80783d7aa255dfad765b9dc88
-
Filesize
1.7MB
MD57672509436485121135c2a0e30b9e9ff
SHA1f557022a9f42fe1303078093e389f21fb693c959
SHA256d7ea3cf1b9b639010005e503877026597a743d1068ae6a453ce77cc202796fea
SHA512e46ff68c4a532017f8ab15b1e46565508f6285b72c7a1cbe964ed5e75320c8e14587d01fee61b3966f43636bfe74cebd21f7665b4a726281e771cf9230e69863
-
Filesize
65KB
MD5b36d3f105d18e55534ad605cbf061a92
SHA1788ef2de1dea6c8fe1d23a2e1007542f7321ed79
SHA256c6c5e877e92d387e977c135765075b7610df2500e21c16e106a225216e6442ae
SHA51235ae00da025fd578205337a018b35176095a876cd3c3cf67a3e8a8e69cd750a4ccc34ce240f11fae3418e5e93caf5082c987f0c63f9d953ed7cb8d9271e03b62
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
56KB
MD5386aedf86d7f2a2e3f6fc056d3c1e03f
SHA19a2069787b997342f44908850facce63cfab4b6a
SHA256b062aa4b9e9c2fcbec20d0d3c04071a01a1abe08831d780e82e6be22867d1f34
SHA5128544d7ce9adc2628b6160a90775973c41f44ec0123e30b05852d5513d2db401692490bf8a1a3ce4fead40c8dcc0e82f75f5e0be1b45935829242e5276b1baa7b
-
Filesize
56KB
MD50dafb23d5bd4b80c79a0f82dc2de34d0
SHA18159fd03f133c9cd8cfb194971a5250b9ecda0a8
SHA2563ef4c33102886eae3c812b948ff3fbf70bb03dd91e772b852da3f9aaf75bdb29
SHA51278e7fb35cab3d0ace4e4fef2868cc5f31b2254c267402779893b3f3fce90b8d784328ac19ef0d6bd37d975d557917be19d7a8a32a94ff8606afd36883ec1c9bb
-
Filesize
487KB
MD5eaa6b5ee297982a6a396354814006761
SHA1780bf9a61c080a335e8712c5544fcbf9c7bdcd72
SHA256d298fd82a39b2385a742ba1992466e081bea0f49e19ece6b2c87c7c262e1fcee
SHA512ebdc887b6b334b7560f85ab2ebd29dc1f3a2dedac7f70042594f2a9bc128b6fca0a0e7704318ed69b7acf097e962533b3ce07713ef80e8acfe09374c13302999
-
Filesize
477B
MD5ad8982eaa02c7ad4d7cdcbc248caa941
SHA14ccd8e038d73a5361d754c7598ed238fc040d16b
SHA256d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00
SHA5125c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28
-
Filesize
12KB
MD579d79a999c150a89c27ca6071561263a
SHA18ea851a2ce33b179a60a33a2943e7af76c7f47d3
SHA25698d0fa7ef21da414ef92e759f7429600308eaf3b71a846f54dfdae5d46d3b46d
SHA5121fd9393f2a8dd5318ca0efbde8882d5cb5c6605b6b5b9d68025b790ac3958feef1aac0debbe8351475b62cc00cc4edf34bdd1470d7a1ffef39b4afe994e93109
-
Filesize
3KB
MD5ddd3a8c428b0fc88be6acc485bcfbebb
SHA153a7edaf2109fc90af9f76bd7d7db676669acb6c
SHA25618d3217498ff6f3ea32ca75111937ac3727cd0323b4673aeea08a2e24f9fd68c
SHA51218e106c134f91018df9c1fa0bb6636294744f1f7b81fe8da3e626e9cc3504cf933ccfe1120821aadd719155903e5a00d5999a8e5ef0ea2c24ec0b5b7ef87cb27
-
Filesize
98KB
MD54afd7f5c0574a0efd163740ecb142011
SHA13ebca5343804fe94d50026da91647442da084302
SHA2566e39b3fdb6722ea8aa0dc8f46ae0d8bd6496dd0f5f56bac618a0a7dd22d6cfb2
SHA5126f974acec7d6c1b6a423b28810b0840e77a9f9c1f9632c5cba875bd895e076c7e03112285635cf633c2fa9a4d4e2f4a57437ae8df88a7882184ff6685ee15f3f
-
Filesize
137B
MD5e16ac2a22fdfb293c815c945eab28310
SHA166831191df79f5c3990436921b08dc2171b0ca57
SHA25634eda9073fd30d317a6a35e1989dbd74f400121faaa9b1f4c7da138f8686b243
SHA51208480390b059545acb8ca1038c5060693a938c987a1ea1057e6f03951a7db0dee8d97d1540f646f8d249d38e54ea43fb49b01610801deaaacfbe29f4361cbe93
-
Filesize
111B
MD524701b46dccc4ac0b74d23bf457b15a8
SHA12d82c069cc6e05fd6d0bcb7665171ffaf136f8ea
SHA2569ee5f6b1a1202f3bbf64e7fbdd13963fadb2bf299630c17b1397ab2aa15d6731
SHA5124ee56e6cee09bd3e01f9574b01210402acf90f5efb2ff697dcff4eb8f26016462f9d7b1927aa8e34b8a2b3c8eccd7ae148a7c65a07cce663fe27a750249a1be5