Resubmissions

06/08/2024, 08:48

240806-kqtnzayeng 3

06/08/2024, 08:42

240806-kl8x4avdlm 5

06/08/2024, 08:37

240806-kjhccsvcnn 4

Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 08:37

General

  • Target

    LeakedWallpaper.exe

  • Size

    16KB

  • MD5

    10b97d42122f4d60d5bf01d5bb0c41b9

  • SHA1

    b9119354ef171ad1ddedb384b6b904e54877421a

  • SHA256

    d244febf5b859ab97ce51fed4d60e514d21489bb8f9f76368f1ad6ecd50b798c

  • SHA512

    c1a9f7189bde72f85848db624e698e2e225c559c5c9ed8f6a3bfac0046a60fb2a9cfd432fd61f3f08497ddb16234e8889dfb1343d04468cf379a7227a17c505b

  • SSDEEP

    192:px2IGpvHyJ+BW+E9NVuLdmespmKpPIEZD5nb5565sIcoK:v3GpvHyJ+BXE9NVkmzpmMPIkDtb3kK

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LeakedWallpaper.exe
    "C:\Users\Admin\AppData\Local\Temp\LeakedWallpaper.exe"
    1⤵
      PID:1452
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3996,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=3860 /prefetch:8
      1⤵
        PID:4796
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3600
        • C:\Windows\system32\mspaint.exe
          "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ConvertFromSet.dib"
          1⤵
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3456
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
          1⤵
            PID:2948

          Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads