Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
wallpaper-engine.torrent
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
wallpaper-engine.torrent
Resource
win10v2004-20240508-en
General
-
Target
wallpaper-engine.torrent
-
Size
426KB
-
MD5
1b5aab1bcd7470222e80cb9c4ad0e989
-
SHA1
2bf2ba06d96e2346fd73fe30e6a71e5970531010
-
SHA256
b94b75d830a307ebdd1b13655c42cbd28f89ccf790683d9b4c78efc508eaf835
-
SHA512
d4eaca4e4f342ce6a75310a2c71c5ab6be3d3cd58ddf81878d9a997eaed14b0ba73bd2df4d1a858088c3d9ae5c8d4d7fca2e99c8f717edfa82d5dd04b88b1e5e
-
SSDEEP
6144:oa7slff8pLZnDFMv7wNvIoD8/R+7dBIWymS5aPtJSUYwWGN:98U+4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633701634402434" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3620 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4988 1136 chrome.exe 90 PID 1136 wrote to memory of 4988 1136 chrome.exe 90 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 1784 1136 chrome.exe 91 PID 1136 wrote to memory of 4696 1136 chrome.exe 92 PID 1136 wrote to memory of 4696 1136 chrome.exe 92 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93 PID 1136 wrote to memory of 3812 1136 chrome.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\wallpaper-engine.torrent1⤵
- Modifies registry class
PID:4712
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c16ab58,0x7fff8c16ab68,0x7fff8c16ab782⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:22⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3936 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4128 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4876 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3108 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3136 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2440 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2544 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1560 --field-trial-handle=1868,i,17832615277555173600,4885715828938636258,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD55e557eedd2d5a3f34e0b9b4b0a82855e
SHA1bff96182b11f8d9b86b2c338317484e430179b63
SHA2563a7bd4b848cd0edb5b43e9d31e6b2ed5de34e44bbe5505ae06b6f302c058aca6
SHA512739c021d153abe8ab2c8a6855f7c49316214a59056f12510c5e99559b807196637d2f1df594904632490ff237679d8e11a82b27121880fc159cf37b330296798
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5983724f20da695f5d1eb6c6ac094041d
SHA1724907fc705800f2f12c3f3fc3147ee7ad24beb5
SHA256318ba66e3b641479f4d702c6c735ffec6050541678abfb58b977a4d0d4f8ddf4
SHA51264d2e593c465a05d7679e6318c321d5ba3cfa4cfb47c208b8a9251133e1c5f1e00821c114198b3d0682156d46284af35ab4a739b5d02a6ee4b9879fa3d064a35
-
Filesize
7KB
MD57be58bedf09f42e36dd1dfa946ea6cf1
SHA18525b6d1228361f21bf593833d916eb38cd74c64
SHA256939a392d02541a3e6d7c05d52b132db5f5d6505b3e734422c2a181a1033bdfb5
SHA5123612d698a63c63ade009865e84fb6a97a643731aeef261bab9c824839f4752170505bfc011aba1835770d8bafbc67c0586aac58c95ea18863acfdc4c884f3964