Analysis

  • max time kernel
    1794s
  • max time network
    1750s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 16:12

General

  • Target

    WHO LET BRO COOK.mp4

  • Size

    3.0MB

  • MD5

    b38d243bf3411ba480a1894e0d4504c4

  • SHA1

    920b7dd5b1d7786373869ba2ca48be002c419a8a

  • SHA256

    e419a9f33cbeaca0cab330f3d7152455fcba727cc6aaf39f3693565a79be694e

  • SHA512

    493207fddf5c6eca3e80fb3ca3f413219f387c3417da4cba65e4eb669c33d4109bc4179a231059cea1204cb0e6af64c376ec009daa3548cdce37148dfb04b1fd

  • SSDEEP

    98304:gEjPQMNqzHW4ESLCI/ahAYNDdmDbBLFReB5Y:gQqzHoSLCI/aaYfsYY

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\WHO LET BRO COOK.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\WHO LET BRO COOK.mp4"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:2060
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\WHO LET BRO COOK.mp4"
        3⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1680
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1108
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4248
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2e0 0x31c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    64KB

    MD5

    fc240c081ec382df4b74d591d7d37a45

    SHA1

    396e9d8accb2ff8b32e6c3957808cb87d23ad47c

    SHA256

    8cfeb277627a0fc9f2596c83dc37f9a3d8871293cd88dadd08f32098bf936038

    SHA512

    d8f83773c330b88b43f9ebc6220aa98368854e44a75b73a8575e7171f6c32e784d404e5a2e2e7787d3c71c0cfecdbb983631b639d9fee879b374d498d2ef0ab7

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    7090eef6cdd2157b986f1e798e47b0e1

    SHA1

    70adc3aa7be4d135ffe5da898f07cbb0090837b9

    SHA256

    5d9a1cf96859ee3767f94439b20cc23c379c799970865271f4f09633ff46f5c2

    SHA512

    163d65a4f396b2d66d4e49d7e139835d7b0bc0f6c4d70668c1faff4891ace3f62b427416b51b78866772d55b90eb52c3d93431327a7d172317b6a6709dadc517

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    10a34860af9f05b4c13644692c7f87db

    SHA1

    6d3a242c5a49a8597aefb93e11253b768329d0a3

    SHA256

    c04b312ddb614e246d4ac4dacbf8606c0c6f48bd06c817f42bffa930a0128921

    SHA512

    da9854e5f2cf7b8358b11423962ea77c59464ce502b9434e5b6e01aa3583f71d9308a831af3337caa0199d66bfd3759e85079fee7ffdd7f0cefbb5e434345979

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    9196a1515bb9b21ba4a8fc0a0384ee4c

    SHA1

    bceff104020fa01c8979d50841348f4e996c4572

    SHA256

    e8862569de55cecff4b50f35c426253e2756ec72ef1df3fb491ada155b7a2f24

    SHA512

    f9157653f1a4475a1b841d435aaca2c535d434ffc53b7ce0b387cf40b46a391376bd694549333bfe0aa91536c721c7cd150d42313e8be9f15f6ef07f1599240a

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    2KB

    MD5

    d9b6a3d921f25dfb5da2e2a48cf19e40

    SHA1

    0522608449cf027e9b5667e138924dd64a852a1f

    SHA256

    fa3808bb781e893e8ccf7eaaf9398f5015dad4ef008a40ebe4ae188878d2311e

    SHA512

    2ad5a387cd3c8d4ef959f3c3a24365573005e47e98c603999bb5a8e1d854ff306d2e34026ce8605824146d9bb2ac844a7fa80afd64a70e0d42f8a0d242512505

  • memory/1680-188-0x0000000008B20000-0x0000000008B30000-memory.dmp

    Filesize

    64KB

  • memory/1680-189-0x0000000008B20000-0x0000000008B30000-memory.dmp

    Filesize

    64KB

  • memory/1680-184-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-185-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-186-0x0000000006900000-0x0000000006910000-memory.dmp

    Filesize

    64KB

  • memory/1680-187-0x0000000006900000-0x0000000006910000-memory.dmp

    Filesize

    64KB

  • memory/1680-182-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-190-0x0000000008B20000-0x0000000008B30000-memory.dmp

    Filesize

    64KB

  • memory/1680-191-0x0000000008B20000-0x0000000008B30000-memory.dmp

    Filesize

    64KB

  • memory/1680-177-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-194-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-195-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-193-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-192-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-196-0x0000000008B20000-0x0000000008B30000-memory.dmp

    Filesize

    64KB

  • memory/1680-197-0x0000000008B20000-0x0000000008B30000-memory.dmp

    Filesize

    64KB

  • memory/1680-179-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-199-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB

  • memory/1680-200-0x0000000006900000-0x0000000006910000-memory.dmp

    Filesize

    64KB

  • memory/1680-176-0x0000000005D70000-0x0000000005D80000-memory.dmp

    Filesize

    64KB