Resubmissions

23-02-2024 11:31

240223-nm1jwsfc9v 1

23-02-2024 11:30

240223-nmex7afc8t 3

23-02-2024 00:21

240223-anpbcshc73 8

22-02-2024 20:41

240222-zgssmseh9w 10

Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 00:21

General

  • Target

    WhatsApp Image 2024-02-22 at 18.48.42.jpg

  • Size

    275KB

  • MD5

    65fbd7e8560a33804c5fef01fbf1031a

  • SHA1

    ec1dd94fa010f3f870bbdad28f0ac1c196d085b7

  • SHA256

    3f2d3f804b2ec5bd87c6facac593090ca47553e8f9a824c9911ad840b61cc113

  • SHA512

    1bfc9edb18260dc5c268bd620f6b5de7fc30fff36d0d9e7fab5387760a7b8231172a91c1c08ee1ca771ebca365dfb047eca0e19be0727a46827353f63e133853

  • SSDEEP

    6144:bxAACWr/TO73Nnjrk4rp4kL02lZbctlepL+Cy/j/zGjd4Utbtqqi2rH1Dbf:bmACW+pok4kLtZbc7Gz4g4+rrVvf

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\WhatsApp Image 2024-02-22 at 18.48.42.jpg"
    1⤵
      PID:652
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3084
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\AppData\Local\Temp\WhatsApp Image 2024-02-22 at 18.48.42.jpg"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
            "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\AppData\Local\Temp\WhatsApp Image 2024-02-22 at 18.48.42.jpg"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4772
            • C:\Windows\SysWOW64\unregmp2.exe
              C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:5048
              • C:\Windows\system32\unregmp2.exe
                "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
                5⤵
                • Modifies Installed Components in the registry
                • Drops desktop.ini file(s)
                • Drops file in Program Files directory
                • Modifies registry class
                PID:2152
            • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
              "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play "C:\Users\Admin\AppData\Local\Temp\WhatsApp Image 2024-02-22 at 18.48.42.jpg"
              4⤵
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:2460
          • C:\Windows\SysWOW64\unregmp2.exe
            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:820
            • C:\Windows\system32\unregmp2.exe
              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
              4⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              PID:4520
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
        1⤵
        • Drops file in Windows directory
        PID:3352

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        64KB

        MD5

        fc240c081ec382df4b74d591d7d37a45

        SHA1

        396e9d8accb2ff8b32e6c3957808cb87d23ad47c

        SHA256

        8cfeb277627a0fc9f2596c83dc37f9a3d8871293cd88dadd08f32098bf936038

        SHA512

        d8f83773c330b88b43f9ebc6220aa98368854e44a75b73a8575e7171f6c32e784d404e5a2e2e7787d3c71c0cfecdbb983631b639d9fee879b374d498d2ef0ab7

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        1024KB

        MD5

        3d51d1174af60ac89c1c88058f12a05c

        SHA1

        0dc8fe4ce29bb3644946ae5eee378f286a33af26

        SHA256

        1e8527628609098b44854fa5f9ad51ce182347176f1ac4bd7cdb513219530db8

        SHA512

        b5692c07d6f5011c2946075b9f9ed9fbb7b8416a82b27d0a6703006c7e3bf066849519394802a5838daf117e62f86dbf490e6ccb3525254702badaa2a75c4416

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

        Filesize

        68KB

        MD5

        9a566b1b1c9a7a57e565495a2737c909

        SHA1

        21eafa6129a6f61624f1383ff54ed2b28228e393

        SHA256

        37073d1be6816ae599f7531783855732960a6ab273ceecac52b8b5cf7b50aa78

        SHA512

        ec6a45bde94b79da76f2971d3ce05a2972b626386e285ce9e2dd490d272dc1d748954ad10caa7c77e3e563c7235857c0339de0ee9a06e7b4d1a1dd9ca7d07f95

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

        Filesize

        9KB

        MD5

        7050d5ae8acfbe560fa11073fef8185d

        SHA1

        5bc38e77ff06785fe0aec5a345c4ccd15752560e

        SHA256

        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

        SHA512

        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        1KB

        MD5

        8eca3f0af708a207d90cd2aef4a9728a

        SHA1

        1017e162ca00feb6e099636cf6cd7c52fa768d81

        SHA256

        b5e38548802197efc7a4c85001d1cca5d055a323776b7c8c2ad680ae9e6fed45

        SHA512

        9c42d8f7b3beb964aafd2f738b4915847eaa3b9afe850e4aedc132db5b3e8e5347bbe5909e2bcc5766f0328c72fc2457cb078ec911d3c37948c128e145cf1706