Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2023, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
dvdplay.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dvdplay.exe
Resource
win10v2004-20230703-en
General
-
Target
dvdplay.exe
-
Size
11KB
-
MD5
b7ff9dee35818d7c2780d3897963d787
-
SHA1
e92da782d0b1b03e6484604d5a1518027e58cea2
-
SHA256
59576775d8a06038bd9975903418aebf003f075d82f1f109feaddab8877e3c20
-
SHA512
be1eea964c35eb4716e286696e6f559c6ba9459cac27073299ec5634ffc628f2f88f5dc44284673d057ec5c1de9f4ded53546640c1394528c155a93efc6acc9d
-
SSDEEP
192:O0Lw0ZGSOrYHMVEkx2dPZ3rHIQ1qgxZMCPEq6lFsAmQPjhFioWSZW:O0BJgkLS2dh3Utqjl8hWSZW
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 920 unregmp2.exe Token: SeCreatePagefilePrivilege 920 unregmp2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2656 2556 dvdplay.exe 85 PID 2556 wrote to memory of 2656 2556 dvdplay.exe 85 PID 2556 wrote to memory of 2656 2556 dvdplay.exe 85 PID 2656 wrote to memory of 5040 2656 wmplayer.exe 87 PID 2656 wrote to memory of 5040 2656 wmplayer.exe 87 PID 2656 wrote to memory of 5040 2656 wmplayer.exe 87 PID 2656 wrote to memory of 3804 2656 wmplayer.exe 88 PID 2656 wrote to memory of 3804 2656 wmplayer.exe 88 PID 2656 wrote to memory of 3804 2656 wmplayer.exe 88 PID 3804 wrote to memory of 920 3804 unregmp2.exe 89 PID 3804 wrote to memory of 920 3804 unregmp2.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dvdplay.exe"C:\Users\Admin\AppData\Local\Temp\dvdplay.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe/device:dvd2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce: /device:dvd3⤵PID:5040
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon3⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT4⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD541e020ee798eceb4ac90cba2142a7a1b
SHA1714ffdf4ddc441ae72c3fb2e4548a8219ad06fb8
SHA25660968b6f285adc7f7347c43815c17a27a383807366f91212b81b17cac20131a8
SHA51229d22703589df058c7f3509ce58f8e2f8fdf1fc2077e0622a796e4f9c17e563994e3cce83d74b5d58d79ae5b335a1e114c86ca7fe149bab10c3656c0acb0ae76
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD57e7b826f5dd35788581ee7f71bed96ae
SHA143eb54b174dde442980ff351a2f354c2140974d0
SHA256bd3f6878a189ca7568f1f470b2308efb05c3231271d94231cd0ee392dfa51498
SHA5126f1cac8618e7c6886ad5979242739832afbed7e2da466dc59eaae977d8e615eb567dfc3cca45fb6bc09d2a9d519b001fe60174258f36ad281ec30ece58a6671c