Analysis
-
max time kernel
12s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
679 (feat. Remy Boyz).mp3
Resource
win10v2004-20240226-en
General
-
Target
679 (feat. Remy Boyz).mp3
-
Size
4.5MB
-
MD5
c4e5771c80a4d8c771f03c5d66a7c894
-
SHA1
4c7402a2f3539e7ca0ee2177b821c305448f1700
-
SHA256
dad27f2a71973717db931e6c0ce0159b540715374801be51445d6bfe3d0096cb
-
SHA512
899ba548341e2d5efa4ebd89a506e8ac3b0344c77f01a21dce68fa474ba4c340cfa836eecf782f6aeb3db2faefe176c7fab36bd31e1fae907c29869aaa0fae78
-
SSDEEP
98304:A10++5sHOqgM8ktaePZcF/A6o+8qCfkCfSKwIPU2XRuU/T4qhs:MwSHKqEFZE3fF/XRp/E/
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 1008 msedge.exe 1008 msedge.exe 2816 identity_helper.exe 2816 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1372 unregmp2.exe Token: SeCreatePagefilePrivilege 1372 unregmp2.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4580 1268 wmplayer.exe 91 PID 1268 wrote to memory of 4580 1268 wmplayer.exe 91 PID 1268 wrote to memory of 4580 1268 wmplayer.exe 91 PID 1268 wrote to memory of 2404 1268 wmplayer.exe 92 PID 1268 wrote to memory of 2404 1268 wmplayer.exe 92 PID 1268 wrote to memory of 2404 1268 wmplayer.exe 92 PID 2404 wrote to memory of 1372 2404 unregmp2.exe 93 PID 2404 wrote to memory of 1372 2404 unregmp2.exe 93 PID 1008 wrote to memory of 4700 1008 msedge.exe 97 PID 1008 wrote to memory of 4700 1008 msedge.exe 97 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 1732 1008 msedge.exe 100 PID 1008 wrote to memory of 2244 1008 msedge.exe 98 PID 1008 wrote to memory of 2244 1008 msedge.exe 98 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99 PID 1008 wrote to memory of 3076 1008 msedge.exe 99
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\679 (feat. Remy Boyz).mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\679 (feat. Remy Boyz).mp3"2⤵PID:4580
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9434346f8,0x7ff943434708,0x7ff9434347182⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12409775237701824175,8563334431781379106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
6KB
MD5f041ab957a43dcb178f85b9406876078
SHA150dfa7f887448cd47ccc4dbaae6ee069bf258d7c
SHA256628b9f3014a6eb07aa745eeec330ca0326fa44bd5e437f356f43fd5e65774ff8
SHA512d177b94f2e1d2297cb55d173ff2300bcf5f5430d3aa1067fd070ccc2e187e942652a6353d0ec5ffa75a7eebd7b01b55a04e858b5c41223f737771340727a8fb6
-
Filesize
6KB
MD5a5081f22b87fac85d7944f6c02d353cc
SHA14534495323f6bdf35864505a8c7c3e545d61e03b
SHA256f6cefe71a6d87b679f5cdbc4a51113e92130710f5c31b6e81e74c2ce43a18508
SHA512365a0f0264435b412fc149e718c6e13386a7ba98a33d5ec6b17c447270083195a92ba8fe0d4533c8811911c4e61790fdaadf3e98ca417e6253609b500aac856c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55d37121189d598bcc4ea72c0fb13be74
SHA1a885148ba63bf379ac6357b3b3c928cd890d7aad
SHA2560113315a0af271d4b3f951dc37dd8d61bc2e5ad6a98b1d79a5f657da13c9c59f
SHA512c87b7b77d0217a994cfe1b4ea500b042288f0441c52a22c0b3ecb906f1a144fc367e74a81ad21c704fdf67de8cb0e79a46f829012495f5989fd900e823c20063
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5f4a38d4951b94efe1bd5befb3a299f4a
SHA156a97b4ab3aeb09fb0d2b08f5e7617ef0426ab8a
SHA2564d1f8426e70d9cf43a13bebd01038e35fd22d2c71e4787fabda2d9195ac1c3bf
SHA512759eca4c3f901dc1a5830b73957e196a1bfccdb88b02df7a2c6305ef7ad56db53b0954d1d5a007cef4a9ee2155acf5c04caa78e8bef94b7e81d4019eaeb52ec8