Resubmissions

14/10/2023, 11:48

231014-nyndpsde4x 6

14/10/2023, 11:44

231014-nwjbzadd9t 8

14/10/2023, 11:41

231014-ntrwbsfd89 6

Analysis

  • max time kernel
    82s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 11:44

General

  • Target

    cinematic-trailer-orchestra-by-infraction-no-copyright-music-glorious-hero.mp3

  • Size

    2.5MB

  • MD5

    9b2dddbb16c4bbd11888d273d6360590

  • SHA1

    caf4189d34c26ba0d7cb5d246fded473e9733a1c

  • SHA256

    878cfe83aad6c5b30ee37d802bc14567e8593d80e02102d7c423908f6a3fb869

  • SHA512

    3352aa87c7e4913829d169f508418aeaedce5a352dde93fa76e1ed355cd31c5961d198b8928200f8b59b02a8ac21aa215a2438ac89c004f0a718b0f337d0317a

  • SSDEEP

    49152:jKL1F3td7Nie3jpNsV6Vc2lKKomylm4YkrdXnvravpFE2LhABdSJbZ:UzXie3jxVtl3Glm43zavpBLSXcZ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\cinematic-trailer-orchestra-by-infraction-no-copyright-music-glorious-hero.mp3"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\cinematic-trailer-orchestra-by-infraction-no-copyright-music-glorious-hero.mp3"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:1248
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\cinematic-trailer-orchestra-by-infraction-no-copyright-music-glorious-hero.mp3"
        3⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2404
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4080
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4464
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x150 0x4ac
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3744
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      64KB

      MD5

      fc240c081ec382df4b74d591d7d37a45

      SHA1

      396e9d8accb2ff8b32e6c3957808cb87d23ad47c

      SHA256

      8cfeb277627a0fc9f2596c83dc37f9a3d8871293cd88dadd08f32098bf936038

      SHA512

      d8f83773c330b88b43f9ebc6220aa98368854e44a75b73a8575e7171f6c32e784d404e5a2e2e7787d3c71c0cfecdbb983631b639d9fee879b374d498d2ef0ab7

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      1024KB

      MD5

      7cd35c9dcad479018ec21caae169bba5

      SHA1

      941bfbe72d8318d438fd09aec976a364e3f14991

      SHA256

      76576f617c371159377b3c6c187f44000faf16012346565a9987c9932d4fe290

      SHA512

      ed7a7ed5a5f5fd8960fdb767cace1c783593676570567ec9362d0415147ddd813f69ccb573f5329c7fdfab46445679ffb55310de08d53a24e19c209c11aaf396

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

      Filesize

      68KB

      MD5

      59bac69c464ebbfde4072d964a7b26b1

      SHA1

      890ed80cf1465778ef29dd6a4b0bd93ff317f5a2

      SHA256

      4193d5de02498cc129ddc520e60db43949b89e53282fdc2242031c7e2d49a78a

      SHA512

      d2e98181ae94b7fb4ee7d8886344a8bf2fc1e6b6961a1ed9489ba38b1fb32235aaefef4fb3031bcb8f0f31390269de5c2c54c03db711868a65610c49ffbb303c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      f640ec42f70ae68411249ed11e4e958e

      SHA1

      932171a96aade07aa30b591f32a4f175b7838489

      SHA256

      21765b38b7a658b9ca41e334308377b0b799309f5d7b5d8f55a572a08e9a02be

      SHA512

      fd90337cba9646f75ba8814cc800112fcbf7429e11687fd3513b2dc86d49fb545aa53499f088ed093c8803a0d06971d7786636c2741e4896aadde13631876220

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      2KB

      MD5

      eb309feeaa2ea9914d4052813ea4b4c9

      SHA1

      72b5eedfa1fca0fdd72feba338c1e82ccc77fdd6

      SHA256

      363e2c5ed0cef43e32bebaae12b022b561b4e5c414069864a1b4158759f95491

      SHA512

      fa63998b999498efd9a5ed53c3809f4ed5f0b8d07bd76ce5d87aae006690013d123750f5ac08c3a318ae16d16d3a188bb85c89ae6473a2b401100a993030fc04

    • memory/2404-49-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-47-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-46-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-50-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-51-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-52-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-53-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-45-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-43-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-68-0x00000000037B0000-0x00000000037C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-69-0x00000000037B0000-0x00000000037C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-77-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/2404-76-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB