Analysis
-
max time kernel
101s -
max time network
192s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/07/2024, 10:56
Behavioral task
behavioral1
Sample
Silent Installing x32.cmd
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Silent Installing x64.cmd
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Silent Uninstalling.cmd
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
Silent Updating.cmd
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
VSTHEMES.pdf
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
source.url
Resource
win11-20240709-en
General
-
Target
Silent Installing x64.cmd
-
Size
1KB
-
MD5
30941f6e22b0f57e06dc4e355ae636f4
-
SHA1
0370bb30363e593686c4d1b0ec7e0fa820140dd0
-
SHA256
c56d8402704a520df42e0b24c03acab1147c536de2f3cbf9b29cd648ddcdf65d
-
SHA512
b8ea32edb908fcbf52c41a81f6b95375b247194be8841882edd08a898ec9686b5bc09ba347cb0d9d08e033a1007528dba0f5e7276d15f2c0b4a1c0a1c9092e88
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Loads dropped DLL 1 IoCs
pid Process 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3720 reg.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2460 2340 WerFault.exe 87 4168 2340 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000_Classes\.Admin\shell\runas\command reg.exe Key created \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000_Classes\.Admin reg.exe Key created \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000_Classes\.Admin\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000_Classes\.Admin\shell\runas reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000_Classes\.Admin\shell\runas\command\ = "cmd /x /d /r set \"f0=%2\" &call \"%2\" %3" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3720 reg.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 2340 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4700 2484 cmd.exe 83 PID 2484 wrote to memory of 4700 2484 cmd.exe 83 PID 2484 wrote to memory of 3720 2484 cmd.exe 84 PID 2484 wrote to memory of 3720 2484 cmd.exe 84 PID 2484 wrote to memory of 4576 2484 cmd.exe 85 PID 2484 wrote to memory of 4576 2484 cmd.exe 85 PID 2484 wrote to memory of 3284 2484 cmd.exe 86 PID 2484 wrote to memory of 3284 2484 cmd.exe 86 PID 2484 wrote to memory of 3284 2484 cmd.exe 86 PID 3284 wrote to memory of 2340 3284 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe 87 PID 3284 wrote to memory of 2340 3284 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe 87 PID 3284 wrote to memory of 2340 3284 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Silent Installing x64.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\mode.commode con:cols=145 lines=152⤵PID:4700
-
-
C:\Windows\system32\reg.exereg add hkcu\software\classes\.Admin\shell\runas\command /f /ve /d "cmd /x /d /r set \"f0=%2\" &call \"%2\" %3"2⤵
- Access Token Manipulation: Create Process with Token
- Modifies registry class
- Modifies registry key
PID:3720
-
-
C:\Windows\system32\fltMC.exefltmc2⤵PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe"C:\Users\Admin\AppData\Local\Temp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe" /X64 /VERYSILENT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\is-QO3M0.tmp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp"C:\Users\Admin\AppData\Local\Temp\is-QO3M0.tmp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp" /SL5="$5027A,168019810,261120,C:\Users\Admin\AppData\Local\Temp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe" /X64 /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 8884⤵
- Program crash
PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 8884⤵
- Program crash
PID:4168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2340 -ip 23401⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2340 -ip 23401⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.9MB
MD5848b24f1b76decdb88171c832513e206
SHA192cc0f8d2a7576140276a043fa5783746584c6fc
SHA25643f18653a4ce3ed5ba0a5290bbb830d1cb254f8f2737e71780ca6d3f00ecedb8
SHA5123ba654d88dfac74922bfddcf0761cc0073f58cbf29c0fbd559c719dae56c04889783b6bc15276560a1ff0a6780ca0f7c5c40ce98074db12978e09d3a91957bc8