Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2023, 13:05

General

  • Target

    Hey Deborah.msg

  • Size

    79KB

  • MD5

    adf5713f6be6c5640a83299c9f9ae7e6

  • SHA1

    aba799092865f2cebcad3cbf1ee047f98ef0be17

  • SHA256

    aab3cc28b25d0fe198862819686266610a300673e00319290837c02f48531208

  • SHA512

    3bbfb83e23953796d4fb61ffbfe334ec45f5309f486ce50adf0c6ffb60ce2c449cb64ef589a20030753add155fa5d080e75bcddf37c58462ba7d5609f9c18705

  • SSDEEP

    768:XP9tDKDa5z3BaGQGLW1aq+wzoXWsKFWsKtL/ozDyoDNhUwACwWqgGV2Os6M8iafZ:f9oeTaGPLWAekWNWazDcWqfVxZiw

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Hey Deborah.msg"
    1⤵
    • Modifies registry class
    PID:1796
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\AppData\Local\Temp\Hey Deborah.msg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
        "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\AppData\Local\Temp\Hey Deborah.msg"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\SysWOW64\unregmp2.exe
          C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3720
          • C:\Windows\system32\unregmp2.exe
            "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
            5⤵
            • Modifies Installed Components in the registry
            • Drops desktop.ini file(s)
            • Drops file in Program Files directory
            • Modifies registry class
            PID:1512
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play "C:\Users\Admin\AppData\Local\Temp\Hey Deborah.msg"
          4⤵
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4944
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:872
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          4⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:3944
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4104
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x248 0x150
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          256KB

          MD5

          9c481a94abc7eee23cd5234262e60077

          SHA1

          2873225e708fb5461ac60c3613fe12112423f0f0

          SHA256

          681c9665d741ca6ed709cdd79d070ff7f4fdf158e02342f7d47e90a6d962b061

          SHA512

          0579499b5f01649f7e5e3afad07b4c7924d30fbc56dd12b37d9ad46bdefe35fcb6371694c1eff6c42d56c21b1de4c4f40531b27cd32eca1bdf51c6cac41fe668

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          1024KB

          MD5

          3e14930cc706855eef6f222ac513c284

          SHA1

          a89f6d39212c3db2cd793abefc4a48a332040ed3

          SHA256

          b818173367bc8de334ce70c3354c71e6a40daa97eb05acfc1d552d4565ce0f8e

          SHA512

          9befdd361e0aaaf20ebf63310ce60de7c1d66e1a5c8480b8f11421e35d3fb6dc02e044a6cb96bf996ff14675b711ff45f714c9bd0f78f34bc3afe5962cee54b2

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

          Filesize

          68KB

          MD5

          abc1187263642c7877b1f723d5273a9d

          SHA1

          f23114bffb3bd42bc8aa9924e7403587092b0ef4

          SHA256

          5543ba38a56ebd034041a9c8fc942e6a014ccb94645ce82ab5cc85a0745a6b43

          SHA512

          8e3d68ec70428df24c32f596dff72aa3b9e54d211302a934a432679b3160521a0b55315c131d8ae95658e568094b80a5d2d57cc7844a8d5e9fb7448719e9dd5f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          1KB

          MD5

          d725f6e3c2430531d7b97f7ca4dd74b8

          SHA1

          df29e07f3fa258827e5d2a5a42ccd43447d22b00

          SHA256

          4015e76965d23b5755aa344e43ea8553823a850010e82d6a07fdd75cb1b84bca

          SHA512

          d7e2403a005d725f4dcf185446d0b4886ef8543f39e4ac0f140a7c6df93aefd0814e4cf9d95c3b9e2fb4c76080fcaff701c9a9b341f3df95812779c82caf1175

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          2KB

          MD5

          6c45b6978a67ca227dd907a471401968

          SHA1

          f226452344c3e12ea1d995edab1f2061be501a6f

          SHA256

          c927a8a8f9d6285a67b6d6fdc0979fb31c51eb8960f6aa4cf590f80724aefdb1

          SHA512

          5cc431c11192fa83747ef0c136b637fc591d6e6b451a9f8f197da3854b9dacb7acb99748861b2aba501b3d993c16d2745930c5e5e3b169f075a1dd10fee761db

        • memory/4944-65-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-70-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-49-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-51-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-48-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-52-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-53-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-55-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-56-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-45-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-44-0x0000000006D70000-0x0000000006D80000-memory.dmp

          Filesize

          64KB

        • memory/4944-62-0x0000000006D70000-0x0000000006D80000-memory.dmp

          Filesize

          64KB

        • memory/4944-61-0x0000000006D70000-0x0000000006D80000-memory.dmp

          Filesize

          64KB

        • memory/4944-64-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-43-0x0000000006D70000-0x0000000006D80000-memory.dmp

          Filesize

          64KB

        • memory/4944-66-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-67-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-68-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-69-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-47-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-72-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-73-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-74-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-75-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-76-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-77-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-79-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-80-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-81-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-83-0x0000000006D70000-0x0000000006D80000-memory.dmp

          Filesize

          64KB

        • memory/4944-82-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-78-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-86-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-85-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-88-0x00000000091D0000-0x00000000091E0000-memory.dmp

          Filesize

          64KB

        • memory/4944-87-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB

        • memory/4944-89-0x0000000006F30000-0x0000000006F40000-memory.dmp

          Filesize

          64KB