Analysis
-
max time kernel
31s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
09-10-2023 14:27
Static task
static1
Behavioral task
behavioral1
Sample
akatsuki-members-and-logo-moewalls-com.mp4
Resource
win10v2004-20230915-es
General
-
Target
akatsuki-members-and-logo-moewalls-com.mp4
-
Size
51.9MB
-
MD5
e01483235af06dc9304138ec543fd5eb
-
SHA1
121fe2b78337a326160c9b3fd13f0ec798dfe2a7
-
SHA256
867ca86c75d0c9400725064e339e18783c310733d66249be83574a6cb62ea24b
-
SHA512
e39ef1acf85290eb18c6c147b69137ee2c22a94fd28e4759af5cef29cf83c99db795954e7ac7bfc885cdf6448a24f8fc75017e05f124863317ffa365a0e10572
-
SSDEEP
1572864:u8LX97gbdy/RARXCE7xPQb40e3xgLkpGQ/:HN7gBy/RcrQHLkp1/
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4956 unregmp2.exe Token: SeCreatePagefilePrivilege 4956 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3840 3380 wmplayer.exe 83 PID 3380 wrote to memory of 3840 3380 wmplayer.exe 83 PID 3380 wrote to memory of 3840 3380 wmplayer.exe 83 PID 3380 wrote to memory of 1564 3380 wmplayer.exe 84 PID 3380 wrote to memory of 1564 3380 wmplayer.exe 84 PID 3380 wrote to memory of 1564 3380 wmplayer.exe 84 PID 1564 wrote to memory of 4956 1564 unregmp2.exe 85 PID 1564 wrote to memory of 4956 1564 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\akatsuki-members-and-logo-moewalls-com.mp4"1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\akatsuki-members-and-logo-moewalls-com.mp4"2⤵PID:3840
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5329037e3483efcb4f917cbad8f766c0a
SHA1098289ab84cc3fbd349ccea0af3ee266a85e3a13
SHA25606b87bd19a78940bd78f8dc44e7197d2f439447258557505fe3b69932ada1d74
SHA512f8573284ec8b83fbe7ee0cb87b11f55432a5dc5dd5f78dd58d8cc54809c1d389570a7938b2853b24558b9bad5cc29ba0078dfe9b9a80a0f68336e8db02d19d74
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD542ddf7721f3da966f4572e60acbfbc69
SHA1897271b3d9e7c0b660695874354baf8bf3225ef9
SHA256cc4cdfff701cf1f0ba2e474efc516df31c7b8c9627406cb5391f54276972e001
SHA51205e5d366d6933500429ab8be4c16f50489dad873bc91a723819aec0f7d7a6fd3b29d8caad12a6961ff1f2a12fe1a25641746baecae389ba05d8fa5849a4cb081