Overview
overview
8Static
static
AMR Player...er.exe
windows7-x64
1AMR Player...er.exe
windows10-2004-x64
1AMR Player...OM.exe
windows7-x64
1AMR Player...OM.exe
windows10-2004-x64
1AMR Player...ec.dll
windows7-x64
3AMR Player...ec.dll
windows10-2004-x64
3AMR Player...at.dll
windows7-x64
3AMR Player...at.dll
windows10-2004-x64
3AMR Player/avutil.dll
windows7-x64
1AMR Player/avutil.dll
windows10-2004-x64
1AMR Player/bass.dll
windows7-x64
1AMR Player/bass.dll
windows10-2004-x64
1AMR Player/lpk.dll
windows7-x64
8AMR Player/lpk.dll
windows10-2004-x64
8AMR Player...C2.dll
windows7-x64
1AMR Player...C2.dll
windows10-2004-x64
Analysis
-
max time kernel
169s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
AMR Player/AMRPlayer.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
AMR Player/AMRPlayer.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
AMR Player/AMRPlayer_99D.COM.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
AMR Player/AMRPlayer_99D.COM.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
AMR Player/avcodec.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
AMR Player/avcodec.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
AMR Player/avformat.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AMR Player/avformat.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
AMR Player/avutil.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
AMR Player/avutil.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
AMR Player/bass.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
AMR Player/bass.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
AMR Player/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
AMR Player/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
AMR Player/pthreadGC2.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
AMR Player/pthreadGC2.dll
Resource
win10v2004-20221111-en
General
-
Target
AMR Player/lpk.dll
-
Size
46KB
-
MD5
77774d76e724ae9017bac8609947899c
-
SHA1
efd281c15cc901fee9c64f88fd0b74eb1fa82b57
-
SHA256
2017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
-
SHA512
68d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f
-
SSDEEP
768:IUWUAohfjiT5ediDgEYe5eWomHEo2fKEFCLxu5qr7Ho73UEWkGpIfxMC:10qfWT5MbEYme9aLMBCVuEXID3x+C
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4300 hrl2115.tmp 2100 kcimci.exe -
resource yara_rule behavioral14/files/0x0003000000000725-134.dat upx behavioral14/files/0x0003000000000725-135.dat upx behavioral14/files/0x0003000000000727-136.dat upx behavioral14/files/0x0003000000000727-137.dat upx behavioral14/memory/4300-138-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral14/memory/2100-139-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral14/memory/2100-141-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 2100 kcimci.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kcimci.exe hrl2115.tmp File opened for modification C:\Windows\SysWOW64\kcimci.exe hrl2115.tmp File created C:\Windows\SysWOW64\gei33.dll kcimci.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1324 1260 rundll32.exe 79 PID 1260 wrote to memory of 1324 1260 rundll32.exe 79 PID 1260 wrote to memory of 1324 1260 rundll32.exe 79 PID 1324 wrote to memory of 4300 1324 rundll32.exe 81 PID 1324 wrote to memory of 4300 1324 rundll32.exe 81 PID 1324 wrote to memory of 4300 1324 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\AMR Player\lpk.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\AMR Player\lpk.dll",#12⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\hrl2115.tmpC:\Users\Admin\AppData\Local\Temp\hrl2115.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4300
-
-
-
C:\Windows\SysWOW64\kcimci.exeC:\Windows\SysWOW64\kcimci.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2100
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
46KB
MD577774d76e724ae9017bac8609947899c
SHA1efd281c15cc901fee9c64f88fd0b74eb1fa82b57
SHA2562017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
SHA51268d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f