Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
_Nachoneko_cover_(getmp3.pro).mp3
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
_Nachoneko_cover_(getmp3.pro).mp3
Resource
win10v2004-20240220-en
General
-
Target
_Nachoneko_cover_(getmp3.pro).mp3
-
Size
4.7MB
-
MD5
a437aea21c05238364cdc59a812fc41b
-
SHA1
9e0037efb2d89022e5452a115e0eca70f6dc799d
-
SHA256
ec59b6cadd4773d917f3ced530b911a47d9a138fbad6eb13ede203ab4f42e416
-
SHA512
f3cdfac4bd3e71ab36649655db6c733c1d5444bc50d6e9445a8b87b06c254e32182a412fd3bd017313df19e9c02805bb3424b3e88c970087814639574272eae9
-
SSDEEP
98304:XrO7Jp4e7ZHC/FoJTVcG6qJytX/3+7MKQP+QXHY3SFepbI1/4Gmak+X+:7OwC5aG63tX/u7KVH4WybI1/pvs
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4436 unregmp2.exe Token: SeCreatePagefilePrivilege 4436 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2944 wrote to memory of 4760 2944 wmplayer.exe 86 PID 2944 wrote to memory of 4760 2944 wmplayer.exe 86 PID 2944 wrote to memory of 4760 2944 wmplayer.exe 86 PID 2944 wrote to memory of 1308 2944 wmplayer.exe 87 PID 2944 wrote to memory of 1308 2944 wmplayer.exe 87 PID 2944 wrote to memory of 1308 2944 wmplayer.exe 87 PID 1308 wrote to memory of 4436 1308 unregmp2.exe 88 PID 1308 wrote to memory of 4436 1308 unregmp2.exe 88
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\_Nachoneko_cover_(getmp3.pro).mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\_Nachoneko_cover_(getmp3.pro).mp3"2⤵PID:4760
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c374c25875887db7d072033f817b6ce1
SHA13a6d10268f30e42f973dadf044dba7497e05cdaf
SHA25605d47b87b577841cc40db176ea634ec49b0b97066e192e1d48d84bb977e696b6
SHA5126a14f81a300695c09cb335c13155144e562c86bb0ddfdcab641eb3a168877ad3fcc0579ad86162622998928378ea2ffe5a244b3ddbe6c11a959dbb34af374a7d
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD57ab73ab0e31e9feb6d8b4d5dfb82305b
SHA1d7c5465ee41f3200d9f7a8a1da8dd8c3f043664b
SHA256cd7f468ba08200c188cc6cff7be45b0a1695e4ec9a849ce1e7f621b005688e70
SHA512418e4606c214fc858bab03a65b74b40c098dfd52823c4a5616e16b759d3887d9c3fc47be09cbb42a8706d71e978da0322f068693db3754c2c766ae3813b06b58