Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2023, 09:49

General

  • Target

    20230531_103330.mp4

  • Size

    15.8MB

  • MD5

    1c4704351a3bb4bb5a9f7b0e32ceb84c

  • SHA1

    8dde3ce0f928ba777919ac1f97065b567987d549

  • SHA256

    93f3efe79aea3fbaa6079d905146e9df1e33f0c6f745b84c376b0b7611cc58b5

  • SHA512

    ac730d79dd33d972ad87394326a4914083f144988bd83286f7c8a4ce510c19981e1d12989093d869ed2cd3e5008eaf5b60526495ddb472e8e4b919d23f00af02

  • SSDEEP

    393216:VaNSkRBDdfdGwJneVp0r+TF/JscyvF7mwgBXRY:+DjGcneVe+ZJsD07Y

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\20230531_103330.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\20230531_103330.mp4"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4448
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:4996
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\20230531_103330.mp4"
        3⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3160
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1464
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4504
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x504 0x45c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1516

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          256KB

          MD5

          2936527c6171be1065c6012a3e8ffddd

          SHA1

          9273557d3cfc6987eac30802569e9d2579d7d4a4

          SHA256

          e341ab7fd265205d2477cb5234a6c3d35911d7ebb17139b585b55eb7def237e0

          SHA512

          a83203b4696232299c70ff0f7ae292964417b0636d278544fd252a41e6ab3b5c749e836d83d7b22bc52d56dc069bb8caa0ebf5634b32e3acae7afc87c1215e5d

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          1024KB

          MD5

          a385e106220e7f48fe054c01d5741659

          SHA1

          060ec2e97f958f519b0e68495d30a8667fbb1a74

          SHA256

          f14b7050539228fcf8a7264de8661d84bb2483da0a40f3ea8538abc481de6bb5

          SHA512

          bd7818c46a960b3d16e76a42ec25c9ff5894449e11dbbd79608ea93458a3bd58610bd9de534a34103d6130940162d1117c298955a0c0625885b3b4058d674346

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

          Filesize

          68KB

          MD5

          4d68b676b7f1e644e1ddd042fd5790da

          SHA1

          13db5bdacd57f0d97a0a1305c905dd00c4001c0a

          SHA256

          5e68ade98fccdd56d088d7b789c52dddd66e8939687091df98687b37420644d9

          SHA512

          9590d6e8611456340130dbead2aa93fd7b6daa6e61eccddfcd12c3ec694e86b8eafee75f174aac06d3b9836a802075336912e01f3ef8e7ff53f9c8224468b213

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          1KB

          MD5

          c9baf31f0c3235cfa767bd27184709af

          SHA1

          30480596b736c080abcceb8dcb16c8d8e46e231b

          SHA256

          989709ef2971bc25da86cdf2729116a3808597c33969d28ae6f18ee6fb54f353

          SHA512

          3a1858e66dc47e0ffd312b25a2414cb415086059ca1af5f70a6e2997462ecfcbcd132fe7eb0a8478fc0b7097acf4cb1256ba0d27fe0d708ab29d65a0d3094f46

        • memory/3160-179-0x0000000003670000-0x0000000003680000-memory.dmp

          Filesize

          64KB

        • memory/3160-178-0x0000000003670000-0x0000000003680000-memory.dmp

          Filesize

          64KB

        • memory/3160-180-0x0000000005E00000-0x0000000005E10000-memory.dmp

          Filesize

          64KB

        • memory/3160-181-0x0000000008580000-0x0000000008590000-memory.dmp

          Filesize

          64KB

        • memory/3160-182-0x0000000008580000-0x0000000008590000-memory.dmp

          Filesize

          64KB

        • memory/3160-184-0x0000000003670000-0x0000000003680000-memory.dmp

          Filesize

          64KB

        • memory/3160-183-0x0000000003670000-0x0000000003680000-memory.dmp

          Filesize

          64KB

        • memory/3160-185-0x0000000008580000-0x0000000008590000-memory.dmp

          Filesize

          64KB

        • memory/3160-177-0x0000000003670000-0x0000000003680000-memory.dmp

          Filesize

          64KB

        • memory/3160-174-0x0000000003670000-0x0000000003680000-memory.dmp

          Filesize

          64KB