Analysis

  • max time kernel
    73s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2022, 03:17

General

  • Target

    Rick Astley - Never Gonna Give You Up (Pop Punk Cover) - CG5 & @Halocene.mp4

  • Size

    28.1MB

  • MD5

    54fab6d0f8eff92594990fba7b4db68b

  • SHA1

    2d534924b6efe7e03462a33b4a4363f7aa88dde0

  • SHA256

    06a8fca078a18e4955b32ea7420d0e3e58f6e54ca2b177f0c4ba1acbc482cd80

  • SHA512

    5dcf2a6ee166861217ad5b50b1ffbe6309375274ceed022015287d430ae042efe8b34adff7a4faf26b79b7c96ea1db382699c895aff6a78ab55cd04ed6801de2

  • SSDEEP

    786432:k8+s2UMaeAZ6nndk70NCG7jMHgVQaZLjQxbv:k8+EMZQ6ndkINCkjMWJdGz

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Rick Astley - Never Gonna Give You Up (Pop Punk Cover) - CG5 & @Halocene.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Rick Astley - Never Gonna Give You Up (Pop Punk Cover) - CG5 & @Halocene.mp4"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:4576
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Rick Astley - Never Gonna Give You Up (Pop Punk Cover) - CG5 & @Halocene.mp4"
        3⤵
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3832
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4140
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4dc 0x49c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:792

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          1024KB

          MD5

          f6fbee172a7cb7c890ddfc92cefd11ef

          SHA1

          614c6c5dd191c5538d4c7839b73a3386c417cb78

          SHA256

          694fbd20cc75b4e8c8589b2a3a00177658084d091248c54975690483e529edbd

          SHA512

          afc085e27bbf26bf2052b8100355b81dc3c2df2d858430379c50a239796f9fa660911d04a58af57816a52eb209ebdc732697b5f1eda3e26b87f36ff1e92fa13b

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          1KB

          MD5

          a3a4983f20af5d0a27ab5fae65541797

          SHA1

          81da0f0bc06d1f5645319f4bca75f3b1cbe7ba91

          SHA256

          c0e96a03143ffdab153827b1ff63f42e8d91fa9268d5ecfb94e8c3cfa0fbbae4

          SHA512

          223145db93d4ce25fc9c689a4c3da4cf09147a1bc84afbf65bc926c0213572610c871aea63f511a4a2f489be77dd6b51a96017e286ca6c5ffcb36ea665577b56

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          2KB

          MD5

          21e8ab3a34028617db348b79af2f022e

          SHA1

          afc746cb522470c76302d4c6c8321576e004fa0f

          SHA256

          329c290f7337f26781c66aab641ec8fa076caedbc455b5efd68533ac97bfa671

          SHA512

          aaf0ec76bcfd25001f62baf04e625a7c13e1ea7eb3c6d8a451832720f70c2e29e7a8cefc93eb97c1ab68af7593130270fed6bf1c3b6a51d4528c7018f583dc23

        • memory/3832-149-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-146-0x0000000005B70000-0x0000000005B80000-memory.dmp

          Filesize

          64KB

        • memory/3832-152-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-142-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-143-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-144-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-145-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-147-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB

        • memory/3832-148-0x0000000005B70000-0x0000000005B80000-memory.dmp

          Filesize

          64KB

        • memory/3832-151-0x0000000007EB0000-0x0000000007EC0000-memory.dmp

          Filesize

          64KB

        • memory/3832-150-0x0000000005140000-0x0000000005150000-memory.dmp

          Filesize

          64KB