Resubmissions
02/06/2023, 06:42
230602-hgsn7saf8z 6Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
Nier Hentai - Human Desire.mp4
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Nier Hentai - Human Desire.mp4
Resource
win10v2004-20230220-en
General
-
Target
Nier Hentai - Human Desire.mp4
-
Size
63.3MB
-
MD5
5e4f27d61775be4d4e4331967c4c3199
-
SHA1
a4f80a672623cba295d39c6d6832c7f15f89190d
-
SHA256
64c9518251ed962e805c3eabc860ab6ae77b0c8c139f4b4c50fee98335b6bbc4
-
SHA512
76dde0c3a8e35241e1846d9a9e263cdc01db41484451f43e7160e697f9905f4f71507450d8358141ff70b107fdac837e688b52e834bd6993995ff1930dacd87e
-
SSDEEP
1572864:UYa6hvFi8HWZ6YVQrYcr5IkE6VOdDrTqqu+gXP3McGD:UYasNWZUrykElrTJu+gXPc3D
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\F: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3600 unregmp2.exe Token: SeCreatePagefilePrivilege 3600 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 452 wrote to memory of 2232 452 wmplayer.exe 83 PID 452 wrote to memory of 2232 452 wmplayer.exe 83 PID 452 wrote to memory of 2232 452 wmplayer.exe 83 PID 452 wrote to memory of 4256 452 wmplayer.exe 84 PID 452 wrote to memory of 4256 452 wmplayer.exe 84 PID 452 wrote to memory of 4256 452 wmplayer.exe 84 PID 4256 wrote to memory of 3600 4256 unregmp2.exe 85 PID 4256 wrote to memory of 3600 4256 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nier Hentai - Human Desire.mp4"1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nier Hentai - Human Desire.mp4"2⤵PID:2232
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD52936527c6171be1065c6012a3e8ffddd
SHA19273557d3cfc6987eac30802569e9d2579d7d4a4
SHA256e341ab7fd265205d2477cb5234a6c3d35911d7ebb17139b585b55eb7def237e0
SHA512a83203b4696232299c70ff0f7ae292964417b0636d278544fd252a41e6ab3b5c749e836d83d7b22bc52d56dc069bb8caa0ebf5634b32e3acae7afc87c1215e5d
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5c4a7ffffdfda8a13e1d7755c35791570
SHA161580fda17f1adc9ca1a0a0d80d3d0049c702a5f
SHA256a1fc588d8c0d0b3e64a9fe03ffa79b38169375ae31bf93ef89b83ce88b2bb16f
SHA51264ccbce168370ecdd063fd62eab4c306f934968a00250ccc3a980473cc55fd5d51e9a936092779d5cba0f5e5a815ced796a3ee093470d9eae5e34574f2994b4a