Resubmissions

02/06/2023, 06:42

230602-hgsn7saf8z 6

Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2023, 06:42

General

  • Target

    Nier Hentai - Human Desire.mp4

  • Size

    63.3MB

  • MD5

    5e4f27d61775be4d4e4331967c4c3199

  • SHA1

    a4f80a672623cba295d39c6d6832c7f15f89190d

  • SHA256

    64c9518251ed962e805c3eabc860ab6ae77b0c8c139f4b4c50fee98335b6bbc4

  • SHA512

    76dde0c3a8e35241e1846d9a9e263cdc01db41484451f43e7160e697f9905f4f71507450d8358141ff70b107fdac837e688b52e834bd6993995ff1930dacd87e

  • SSDEEP

    1572864:UYa6hvFi8HWZ6YVQrYcr5IkE6VOdDrTqqu+gXP3McGD:UYasNWZUrykElrTJu+gXPc3D

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nier Hentai - Human Desire.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nier Hentai - Human Desire.mp4"
      2⤵
        PID:2232
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:3600

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      256KB

      MD5

      2936527c6171be1065c6012a3e8ffddd

      SHA1

      9273557d3cfc6987eac30802569e9d2579d7d4a4

      SHA256

      e341ab7fd265205d2477cb5234a6c3d35911d7ebb17139b585b55eb7def237e0

      SHA512

      a83203b4696232299c70ff0f7ae292964417b0636d278544fd252a41e6ab3b5c749e836d83d7b22bc52d56dc069bb8caa0ebf5634b32e3acae7afc87c1215e5d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      c4a7ffffdfda8a13e1d7755c35791570

      SHA1

      61580fda17f1adc9ca1a0a0d80d3d0049c702a5f

      SHA256

      a1fc588d8c0d0b3e64a9fe03ffa79b38169375ae31bf93ef89b83ce88b2bb16f

      SHA512

      64ccbce168370ecdd063fd62eab4c306f934968a00250ccc3a980473cc55fd5d51e9a936092779d5cba0f5e5a815ced796a3ee093470d9eae5e34574f2994b4a