Analysis

  • max time kernel
    131s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2023, 10:51

General

  • Target

    SugarySpire_Dance_And_Cafe_Test_V1.02/gamedata/intro.mp4

  • Size

    26.7MB

  • MD5

    381266f71b3b8bc2cf879b0b3896e517

  • SHA1

    2b6d96e8a56d43222b186bbdbbdac9ffd062f513

  • SHA256

    b332adeb1831e507dbf5f79a997075beb5066555f489cbf911a270d6fb67e1db

  • SHA512

    c08781ec8c0c7b8acb33a23b881c72fc6348293cd7d0f13b87e646d744f0bf8cb81b9e2f08e09b64306f9c28b514bda7d76dc58fb7d8372cd378ec3014a0cce2

  • SSDEEP

    786432:ANoGecJwAsqoLIAhF2IkTPnbQNWWw3xJoI8:C/VwFjVpkbjBGI8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\SugarySpire_Dance_And_Cafe_Test_V1.02\gamedata\intro.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\SugarySpire_Dance_And_Cafe_Test_V1.02\gamedata\intro.mp4"
      2⤵
        PID:2084
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:452

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

            Filesize

            256KB

            MD5

            41e020ee798eceb4ac90cba2142a7a1b

            SHA1

            714ffdf4ddc441ae72c3fb2e4548a8219ad06fb8

            SHA256

            60968b6f285adc7f7347c43815c17a27a383807366f91212b81b17cac20131a8

            SHA512

            29d22703589df058c7f3509ce58f8e2f8fdf1fc2077e0622a796e4f9c17e563994e3cce83d74b5d58d79ae5b335a1e114c86ca7fe149bab10c3656c0acb0ae76

          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

            Filesize

            9KB

            MD5

            7050d5ae8acfbe560fa11073fef8185d

            SHA1

            5bc38e77ff06785fe0aec5a345c4ccd15752560e

            SHA256

            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

            SHA512

            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

          • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

            Filesize

            1KB

            MD5

            19a4c5c5bba6b0cd27f8800d83e942e4

            SHA1

            5bbd6f296f70ba0f6681160a5d89ef4fc122fa1e

            SHA256

            c044b6da4eb68bfbc2c6300908ad94ca7c0989f6a2310c4c8097d14cf0e0c013

            SHA512

            0946c2bcd8c29c59fdae31375ecd9ef768e99fa2fcd49ef9c88b785a65617a7fc9fd49f68067747c813ceb0ae2e79501e162d43248ffad7c3403a361905ffb8c