Analysis
-
max time kernel
142s -
max time network
275s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/07/2024, 10:56
Behavioral task
behavioral1
Sample
Silent Installing x32.cmd
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Silent Installing x64.cmd
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Silent Uninstalling.cmd
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
Silent Updating.cmd
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
VSTHEMES.pdf
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
source.url
Resource
win11-20240709-en
General
-
Target
Silent Updating.cmd
-
Size
1KB
-
MD5
9d50661c9bd69ba87c710ade3e8777a8
-
SHA1
7aca8382068502519fd9bce4dffa102166be1061
-
SHA256
14e6d91b1253e4154316a4ace7894144bfa50c13cce86cd5f133edf4b228ae93
-
SHA512
c4bd6254915e0191b3ccaeb5d7e0482a01935a011f5dbf02e4151477f7fe8c64b1bf46b3206e54b982b4e13c0de6d91f3839551cc73ae97495f9173638be9426
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Loads dropped DLL 1 IoCs
pid Process 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 1580 reg.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2064 1080 WerFault.exe 87 352 1080 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\.Admin\shell\runas\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\.Admin reg.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\.Admin\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\.Admin\shell\runas reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\.Admin\shell\runas\command\ = "cmd /x /d /r set \"f0=%2\" &call \"%2\" %3" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1580 reg.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp 1080 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3056 1876 cmd.exe 83 PID 1876 wrote to memory of 3056 1876 cmd.exe 83 PID 1876 wrote to memory of 1580 1876 cmd.exe 84 PID 1876 wrote to memory of 1580 1876 cmd.exe 84 PID 1876 wrote to memory of 4396 1876 cmd.exe 85 PID 1876 wrote to memory of 4396 1876 cmd.exe 85 PID 1876 wrote to memory of 1996 1876 cmd.exe 86 PID 1876 wrote to memory of 1996 1876 cmd.exe 86 PID 1876 wrote to memory of 1996 1876 cmd.exe 86 PID 1996 wrote to memory of 1080 1996 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe 87 PID 1996 wrote to memory of 1080 1996 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe 87 PID 1996 wrote to memory of 1080 1996 Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Silent Updating.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\mode.commode con:cols=145 lines=152⤵PID:3056
-
-
C:\Windows\system32\reg.exereg add hkcu\software\classes\.Admin\shell\runas\command /f /ve /d "cmd /x /d /r set \"f0=%2\" &call \"%2\" %3"2⤵
- Access Token Manipulation: Create Process with Token
- Modifies registry class
- Modifies registry key
PID:1580
-
-
C:\Windows\system32\fltMC.exefltmc2⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe"C:\Users\Admin\AppData\Local\Temp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe" /UPDATE /VERYSILENT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\is-HL8AU.tmp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp"C:\Users\Admin\AppData\Local\Temp\is-HL8AU.tmp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.tmp" /SL5="$A027A,168019810,261120,C:\Users\Admin\AppData\Local\Temp\Wallpaper_Engine_v2.5.28_RePack_by_xetrin.exe" /UPDATE /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 8884⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 9044⤵
- Program crash
PID:352
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1080 -ip 10801⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1080 -ip 10801⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.9MB
MD5848b24f1b76decdb88171c832513e206
SHA192cc0f8d2a7576140276a043fa5783746584c6fc
SHA25643f18653a4ce3ed5ba0a5290bbb830d1cb254f8f2737e71780ca6d3f00ecedb8
SHA5123ba654d88dfac74922bfddcf0761cc0073f58cbf29c0fbd559c719dae56c04889783b6bc15276560a1ff0a6780ca0f7c5c40ce98074db12978e09d3a91957bc8