Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 12:37

General

  • Target

    1.0.exe

  • Size

    69KB

  • MD5

    248f91bcf92c8bf3e00beb7810de6528

  • SHA1

    b67f22eb906669bfc91ab51bb5c7b2b507f12386

  • SHA256

    88054efd9231124cb9ca5895608db0004b6a4e734a87bc27b5fb1deb92900306

  • SHA512

    5f8ec3dce00d7263f53e1dbaa0ddbcc317f5176952b8561c0e2411c8f3cd9faaebce0780d1410b37dd1df7c4f46c6101c2d7a730834d767c2a9c629d10493a6a

  • SSDEEP

    1536:Kvc+XI2Sv/BEEqE+kEnXx0JaFadHUxIcHduph7oGXPX0GO2:Kvc+XDiBViZYdH4IcHoptoo/0Gp

Score
5/10

Malware Config

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\1.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Documents\GrandiloquentNexus.vbs"
      2⤵
        PID:1400
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\Documents\Wallpaper.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Command Processor" /V DisableUNCCheck /T REG_DWORD /F /D 1
          3⤵
            PID:2512
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\system\wallpaper.bmp"
            3⤵
            • Sets desktop wallpaper using registry
            PID:2996
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Control Panel\Desktop" /V WallpaperStyle /T REG_SZ /F /D 2
            3⤵
              PID:2288
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters
              3⤵
                PID:2752

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Documents\GrandiloquentNexus.vbs

            Filesize

            4KB

            MD5

            68c020a705fd94edc0ff215faaa18133

            SHA1

            20115b84f33eba2d7cab4021760eb43b76071a2f

            SHA256

            b732afd8dc03b126afa6e7880922408f7b07b3d74f87b72abb865ce666645ebc

            SHA512

            077960a00a6858c51189dad96192984a27c6478761337006bf7d8e2ccf6d79a9e8b92e4dd309decdfafd443150829a42f7fdea372366837860c105f7c3524b62

          • C:\Users\Admin\Documents\Wallpaper.bat

            Filesize

            484B

            MD5

            065a6e9e68c1a1b05d17d9448e01bddf

            SHA1

            84461cda0524dc51bdbc32c4dddf41591f138091

            SHA256

            d1397ff4000e5de00b2be0f97e6f71548ad100cbbc548d6e1c9c94e5bd834a48

            SHA512

            b45cfe8b72c70e9a5b30dee421bd4faabb74ab697971586fa4a4d1be939d3fd7b22995c5cef69d6515a955bc54bae6e28da833e6d163adf49ef6964be6049d07

          • memory/2328-0-0x0000000074C21000-0x0000000074C22000-memory.dmp

            Filesize

            4KB

          • memory/2328-1-0x0000000074C20000-0x00000000751CB000-memory.dmp

            Filesize

            5.7MB

          • memory/2328-2-0x0000000074C20000-0x00000000751CB000-memory.dmp

            Filesize

            5.7MB

          • memory/2328-16-0x0000000074C20000-0x00000000751CB000-memory.dmp

            Filesize

            5.7MB