Analysis

  • max time kernel
    66s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    10-06-2023 04:10

General

  • Target

    notscar.mov

  • Size

    88KB

  • MD5

    56881dcdf0084a848edb50347d2d9a7f

  • SHA1

    0f94cb36f076fa5976a78f366aa2839a300da9e7

  • SHA256

    64dee6be9b52f4b0c1728baa228a6bc5f755cb6b667f0c1de814482b9f605c90

  • SHA512

    80bfd36269bef691e0767bf253f3cffdd5513e43fc1c9dd4d8ee8e5ccdd18bcb14517a7d945f688f115ab179c1cd13f10a61f01b8a4ca42ccb6d295fbfb52f4b

  • SSDEEP

    1536:n5JZEQpyBEhQUxwkYq6xLVP89cV/XsHyqI9r+XHmGeCiyFtdwoZPE5oh115OD51g:lDplFH6j80/XAIZ+XHrLFtNPd13ODXlm

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\notscar.mov"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\notscar.mov"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:828
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\notscar.mov"
        3⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4128
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:3276
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x49c 0x33c
    1⤵
      PID:4020

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      64KB

      MD5

      329037e3483efcb4f917cbad8f766c0a

      SHA1

      098289ab84cc3fbd349ccea0af3ee266a85e3a13

      SHA256

      06b87bd19a78940bd78f8dc44e7197d2f439447258557505fe3b69932ada1d74

      SHA512

      f8573284ec8b83fbe7ee0cb87b11f55432a5dc5dd5f78dd58d8cc54809c1d389570a7938b2853b24558b9bad5cc29ba0078dfe9b9a80a0f68336e8db02d19d74

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      1024KB

      MD5

      eb72db05c5eeda3bc845786d2e74999d

      SHA1

      5901c05d14f2870d095f21e0d81d0b16e8b9c364

      SHA256

      4b0262d6de82b2c0de6fa48c5a46b76f717a8a80f1d0a2c7f2ddc6be159087cc

      SHA512

      c83a6350ea36768e497f076fe5da0b661b59c224cd250a694551398979190b0947d898ffef3c7d09e1c72acd7cd3588e07c41f93cfb887f5bca9564952852f5d

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

      Filesize

      68KB

      MD5

      c2a79ff378b1ef681f01e13520aabe20

      SHA1

      98aaf17df5713696fecd1bbda0c3c6199d34ff39

      SHA256

      156247274eb8d6baecafde0bbd51604e8e9308045586a7e7ace38a5da9a48ff7

      SHA512

      9c553d9bfd0ae76e2fae49a37ac36e0a4834de8e1676a3974d036a95fe0af9e08ff9b84f233c0627516813530efe4526d8a5cd60f7b6ec5ccbc74db1eec883c9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      b8a28ad682d17ffc521b70c4803e1581

      SHA1

      81582ca98072d9f65d98fc7c9c4238359b205adc

      SHA256

      c333397213901d055a361bcd03ac33e8d87f03c453524189374fab16772e0ade

      SHA512

      6a85a4c359b2af530c69f6893b91555ea218918118346fd84b07fa8b3eba398419d81a51197d0c3c011200fa668abc55d6901b98361fc0c245654f580b1eedea

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      2KB

      MD5

      a587e56ca9e5912ca30d6ca0cffd7f96

      SHA1

      544c713df4fd1cad93bc4c2a47f3f94bad748577

      SHA256

      8326c192350bba147c684b17b2cdfa2ac182b2120b96235de601d5daeca6bedb

      SHA512

      d440605f4c63a43a9f3d8ff08a4d76f5f6b475d99b22d7477561585c4b98aad170b2b0b1e43ca097f6753bdac4f622858e6abab0a7f536ef7dc06d2e8b6f78d1

    • memory/4128-188-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-190-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB

    • memory/4128-182-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-187-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-186-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-183-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-184-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-185-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-180-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB

    • memory/4128-189-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-191-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB

    • memory/4128-181-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB

    • memory/4128-192-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB

    • memory/4128-193-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-198-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-197-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-196-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-195-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-194-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-200-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-199-0x00000000074B0000-0x00000000074C0000-memory.dmp

      Filesize

      64KB

    • memory/4128-179-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB

    • memory/4128-178-0x0000000004400000-0x0000000004410000-memory.dmp

      Filesize

      64KB