Analysis
-
max time kernel
75s -
max time network
72s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
27/03/2025, 17:30
Behavioral task
behavioral1
Sample
wallpaper-engine-new_aa68862888_VSTHEMES-ORG.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EN.pdf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
RU.pdf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
source.url
Resource
win10ltsc2021-20250314-en
General
-
Target
wallpaper-engine-new_aa68862888_VSTHEMES-ORG.zip
-
Size
219.9MB
-
MD5
396496ff440bcb5ec728ea5c5b50fcdc
-
SHA1
4e3130f3184018dfd6c818662398fca0965d7c57
-
SHA256
c348540e9281c92b3a1994bb343611bf271820cec4a8dde444ae5f60c062be0c
-
SHA512
43265c71e741287b6910ad6e37af728f0a75d5d66755c5456ccb4f275e25fe5e65e897bc1edbfd7c3fbc5b44349e043a5bac2f32dacdc49aad947bb86fd1bebc
-
SSDEEP
6291456:yTCGkEezJ0im6vOeDGfQorW/79jtxIAsBNxNw9:FGjed0tcnDGHCTfxIjNxW
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875703958053959" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3684 chrome.exe 3684 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3748 3684 chrome.exe 96 PID 3684 wrote to memory of 3748 3684 chrome.exe 96 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 3268 3684 chrome.exe 97 PID 3684 wrote to memory of 1664 3684 chrome.exe 98 PID 3684 wrote to memory of 1664 3684 chrome.exe 98 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100 PID 3684 wrote to memory of 2624 3684 chrome.exe 100
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\wallpaper-engine-new_aa68862888_VSTHEMES-ORG.zip1⤵PID:5804
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffb91a8dcf8,0x7ffb91a8dd04,0x7ffb91a8dd102⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2204,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2208 /prefetch:32⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2376,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2944,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3000 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2952,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3020 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4288,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4300 /prefetch:22⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4276,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5044,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5700,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5872,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5948,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:6044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5532,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6048,i,14492124290078170764,5771174223322693077,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD595dbaa39c6134993d48cf4e7e88f110f
SHA1544b38c97eefddfdfabdb0dff2698d0370006251
SHA2560c091b83b4296e2573c58e74159cbfa51094804e210e77345e3e1b00e0f285a5
SHA512c58767db883b6fd0fe17e236b11cc60258a1ab0b37736209cd058b9f6746f2402cb80e26237e3d827e135fcc4d5a83193f245cec860483b8bd778bfc88c40312
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD5882efa03240b79c2943ee412582cc38e
SHA157cbb261b043b8b52c3a892400c05758a091dc35
SHA2565c6a6480875bd4f4c0902e6d60d7f4c2ff67782938cafc46df9594bae820bfff
SHA512d50b7f6c7a58a0af4dbb9a580071d3c6cdabcf795cf949b16ad5f9b97240382fee1fb1f3c9990111fb14005d079b34a3684ef065b9f0ac9747d6c3920d62d6f0
-
Filesize
18KB
MD56a5099df24c10909cd6adca75fd40721
SHA1e5597032c52f629306d492c2486e10c73354ae97
SHA2563095bdf0b9b71776ca10f3675ccacd77e2ab74cf48aa9430c3713d4600b374d1
SHA5125f90c2979122a518c0500522bfeea5c5f2e24d479afbec62d22177fc0cc790524ab04b6e3a8bb51cedb295482da8ce2a741c1559c550051b71e34af3d3ba74de
-
Filesize
80KB
MD5170a19357098d90b59dd8339850d2659
SHA1abb954bb576ff19f55361c3b8066df4c1c307889
SHA256f88816cef6110e9237a4f8584ff731f2790bcb159fc9d7763c017f2c8e459d82
SHA512cb201895bc8f537bf21edd01ddd89ef852a651025c6b73e56136a7b3445a63873a78e1b7ae91835ec1b0f672a446e01b5a453ba60bfe1a916286c4a77295cd75
-
Filesize
155KB
MD5e797cbfe6deb648636c602dda122edb0
SHA1fa3ccfa83f4edb3c82d02930832924014efae5ac
SHA256357f8c817dd66ecad56b79a5284fc753232312415e18b9bb96e88b0520a9def2
SHA512b79e5d3a99bf6398d38a2aa47b43071bc748fbe1ddbe944aad81d859351dede6a79ec0d1810bba12c376e0899e9d5f4cbad6570c462ec46ce4c98fbbccd6ffd9