Overview
overview
8Static
static
AMR Player...er.exe
windows7-x64
1AMR Player...er.exe
windows10-2004-x64
1AMR Player...OM.exe
windows7-x64
1AMR Player...OM.exe
windows10-2004-x64
1AMR Player...ec.dll
windows7-x64
3AMR Player...ec.dll
windows10-2004-x64
3AMR Player...at.dll
windows7-x64
3AMR Player...at.dll
windows10-2004-x64
3AMR Player/avutil.dll
windows7-x64
1AMR Player/avutil.dll
windows10-2004-x64
1AMR Player/bass.dll
windows7-x64
1AMR Player/bass.dll
windows10-2004-x64
1AMR Player/lpk.dll
windows7-x64
8AMR Player/lpk.dll
windows10-2004-x64
8AMR Player...C2.dll
windows7-x64
1AMR Player...C2.dll
windows10-2004-x64
Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
AMR Player/AMRPlayer.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
AMR Player/AMRPlayer.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
AMR Player/AMRPlayer_99D.COM.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
AMR Player/AMRPlayer_99D.COM.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
AMR Player/avcodec.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
AMR Player/avcodec.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
AMR Player/avformat.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AMR Player/avformat.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
AMR Player/avutil.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
AMR Player/avutil.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
AMR Player/bass.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
AMR Player/bass.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
AMR Player/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
AMR Player/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
AMR Player/pthreadGC2.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
AMR Player/pthreadGC2.dll
Resource
win10v2004-20221111-en
General
-
Target
AMR Player/lpk.dll
-
Size
46KB
-
MD5
77774d76e724ae9017bac8609947899c
-
SHA1
efd281c15cc901fee9c64f88fd0b74eb1fa82b57
-
SHA256
2017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
-
SHA512
68d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f
-
SSDEEP
768:IUWUAohfjiT5ediDgEYe5eWomHEo2fKEFCLxu5qr7Ho73UEWkGpIfxMC:10qfWT5MbEYme9aLMBCVuEXID3x+C
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1776 hrlE15.tmp 1900 caycwq.exe -
resource yara_rule behavioral13/files/0x00140000000054ab-56.dat upx behavioral13/files/0x00140000000054ab-57.dat upx behavioral13/files/0x00140000000054ab-59.dat upx behavioral13/files/0x00140000000054ab-60.dat upx behavioral13/memory/1776-61-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral13/files/0x0008000000015622-62.dat upx behavioral13/memory/1776-63-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral13/memory/1900-64-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral13/files/0x0008000000015622-65.dat upx behavioral13/memory/1900-68-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 1676 rundll32.exe 1676 rundll32.exe 1900 caycwq.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: caycwq.exe File opened (read-only) \??\S: caycwq.exe File opened (read-only) \??\V: caycwq.exe File opened (read-only) \??\X: caycwq.exe File opened (read-only) \??\H: caycwq.exe File opened (read-only) \??\K: caycwq.exe File opened (read-only) \??\M: caycwq.exe File opened (read-only) \??\N: caycwq.exe File opened (read-only) \??\P: caycwq.exe File opened (read-only) \??\Q: caycwq.exe File opened (read-only) \??\U: caycwq.exe File opened (read-only) \??\E: caycwq.exe File opened (read-only) \??\J: caycwq.exe File opened (read-only) \??\R: caycwq.exe File opened (read-only) \??\T: caycwq.exe File opened (read-only) \??\Y: caycwq.exe File opened (read-only) \??\F: caycwq.exe File opened (read-only) \??\G: caycwq.exe File opened (read-only) \??\I: caycwq.exe File opened (read-only) \??\O: caycwq.exe File opened (read-only) \??\W: caycwq.exe File opened (read-only) \??\Z: caycwq.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\caycwq.exe hrlE15.tmp File opened for modification C:\Windows\SysWOW64\caycwq.exe hrlE15.tmp File created C:\Windows\SysWOW64\gei33.dll caycwq.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1092 wrote to memory of 1676 1092 rundll32.exe 27 PID 1676 wrote to memory of 1776 1676 rundll32.exe 28 PID 1676 wrote to memory of 1776 1676 rundll32.exe 28 PID 1676 wrote to memory of 1776 1676 rundll32.exe 28 PID 1676 wrote to memory of 1776 1676 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\AMR Player\lpk.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\AMR Player\lpk.dll",#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\hrlE15.tmpC:\Users\Admin\AppData\Local\Temp\hrlE15.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1776
-
-
-
C:\Windows\SysWOW64\caycwq.exeC:\Windows\SysWOW64\caycwq.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
PID:1900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
46KB
MD577774d76e724ae9017bac8609947899c
SHA1efd281c15cc901fee9c64f88fd0b74eb1fa82b57
SHA2562017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
SHA51268d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f