Analysis

  • max time kernel
    109s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2023 03:06

General

  • Target

    happytime-onvif-server/happytime-rtsp-server/test.mp4

  • Size

    7.8MB

  • MD5

    39e3ce8e8a95b00f528145360e9eafd6

  • SHA1

    271e65a9657d5aeda2f91ebf6b6abb928878a2f8

  • SHA256

    fc27bb451fc5fb4a40579d1bd45f60487e25febe5247f4b40dcea84f76ca48dd

  • SHA512

    946e94fe3f0d872552cf5c28fb92a197799aafae8b33aa441c13f65392171c590c576cc7db8a769d3ef270ff71c006adfae9a7176c552f7380d70234162e9590

  • SSDEEP

    196608:Fkz9RQ3xJyNoe2cSnw1M8agj86QT1hCNDJ+jJcr0rbZd5k9R19bY9kSyqvHnmj:eJRQpe2fw1WXU+jJc2bZzIR789dvHnI

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\happytime-onvif-server\happytime-rtsp-server\test.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\happytime-onvif-server\happytime-rtsp-server\test.mp4"
      2⤵
        PID:5040
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:5044

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/388-133-0x0000000000000000-mapping.dmp

    • memory/5040-132-0x0000000000000000-mapping.dmp

    • memory/5044-134-0x0000000000000000-mapping.dmp