Overview
overview
7Static
static
3Cursor-Cus...ws.zip
windows10-2004-x64
1Cursor Custodian.exe
windows10-2004-x64
1SDL2.dll
windows10-2004-x64
1SDL2_image.dll
windows10-2004-x64
1SDL2_mixer.dll
windows10-2004-x64
1SDL2_ttf.dll
windows10-2004-x64
1libfreetype-6.dll
windows10-2004-x64
1libjpeg-9.dll
windows10-2004-x64
1libpng16-16.dll
windows10-2004-x64
1libtiff-5.dll
windows10-2004-x64
1libwebp-7.dll
windows10-2004-x64
1res/fonts/...se.ttf
windows10-2004-x64
7res/sounds/click.wav
windows10-2004-x64
6res/sounds/fall.ps1
windows10-2004-x64
1res/sounds/hit.wav
windows10-2004-x64
6res/sounds/jump.wav
windows10-2004-x64
6res/textur...ow.png
windows10-2004-x64
3res/textur...ay.png
windows10-2004-x64
3res/textur...er.png
windows10-2004-x64
3res/textur...le.png
windows10-2004-x64
3res/textur...ft.png
windows10-2004-x64
3res/textur...ht.png
windows10-2004-x64
3res/textur...ox.png
windows10-2004-x64
3res/textures/logo.png
windows10-2004-x64
3res/textur..._0.png
windows10-2004-x64
3res/textur..._1.png
windows10-2004-x64
3res/textur..._2.png
windows10-2004-x64
3res/textur..._3.png
windows10-2004-x64
3res/textur..._4.png
windows10-2004-x64
3zlib1.dll
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
Cursor-Custodian-Windows.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Cursor Custodian.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
SDL2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
SDL2_image.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
SDL2_mixer.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
SDL2_ttf.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
libfreetype-6.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
libjpeg-9.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
libpng16-16.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
libtiff-5.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
libwebp-7.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
res/fonts/cocogoose.ttf
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
res/sounds/click.wav
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
res/sounds/fall.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
res/sounds/hit.wav
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
res/sounds/jump.wav
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
res/textures/arrow.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
res/textures/death_overlay.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
res/textures/ground/center.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
res/textures/ground/hole.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
res/textures/ground/left.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
res/textures/ground/right.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
res/textures/highscore_box.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
res/textures/logo.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
res/textures/player/player_0.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
res/textures/player/player_1.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
res/textures/player/player_2.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
res/textures/player/player_3.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
res/textures/player/player_4.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
zlib1.dll
Resource
win10v2004-20240226-en
General
-
Target
res/sounds/click.wav
-
Size
5KB
-
MD5
ddb36f9e2cf7dfb8c78f6ce6fe3245a2
-
SHA1
aa4f631333cc95925bce7f03a6c92264cf913a4c
-
SHA256
9499031a25cdcffa34593040bd53deb9075f66ce7ab1c752870d2e369ff2f3ef
-
SHA512
1a421133d7c938373a9107f993f0d7de6465e99db89048b3e40c1f0b11ae5c6f95540a159bd0111228979bf92f2cbab2a4c1fbd3cbb1dbec121b6d787b4db887
-
SSDEEP
96:bzFCuLGjCePWeYwZXRovPAanUp8qyfr0ccEG/IKITHVeeuW2u/pT6ZI7i36mk0O:bzFymsA2mPADmfjcjOh4uxcKA6x
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5048 unregmp2.exe Token: SeCreatePagefilePrivilege 5048 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3276 4120 wmplayer.exe 98 PID 4120 wrote to memory of 3276 4120 wmplayer.exe 98 PID 4120 wrote to memory of 3276 4120 wmplayer.exe 98 PID 4120 wrote to memory of 3960 4120 wmplayer.exe 99 PID 4120 wrote to memory of 3960 4120 wmplayer.exe 99 PID 4120 wrote to memory of 3960 4120 wmplayer.exe 99 PID 3960 wrote to memory of 5048 3960 unregmp2.exe 100 PID 3960 wrote to memory of 5048 3960 unregmp2.exe 100
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\res\sounds\click.wav"1⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\res\sounds\click.wav"2⤵PID:3276
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2368 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fc240c081ec382df4b74d591d7d37a45
SHA1396e9d8accb2ff8b32e6c3957808cb87d23ad47c
SHA2568cfeb277627a0fc9f2596c83dc37f9a3d8871293cd88dadd08f32098bf936038
SHA512d8f83773c330b88b43f9ebc6220aa98368854e44a75b73a8575e7171f6c32e784d404e5a2e2e7787d3c71c0cfecdbb983631b639d9fee879b374d498d2ef0ab7
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD530b5d6ce0b7141313c63b61c03ac165b
SHA18bdf07ea1ccf3460153121e06acfa5791773bd19
SHA256aa95583ec0ffc8e8a931f95767d3086d21ec7be1e3d29796ed4e4750b51c60d7
SHA51267b8f40ee3dfaac2eb264fbc367c61cda27a322e8150fbddc906f0f0ecdfea4b44f90b97e95b1b69ee4ac30186ab05c23cce9f5dcf1f3aed2227542ed0a6d4c9