Overview
overview
7Static
static
3Cursor-Cus...ws.zip
windows10-2004-x64
1Cursor Custodian.exe
windows10-2004-x64
1SDL2.dll
windows10-2004-x64
1SDL2_image.dll
windows10-2004-x64
1SDL2_mixer.dll
windows10-2004-x64
1SDL2_ttf.dll
windows10-2004-x64
1libfreetype-6.dll
windows10-2004-x64
1libjpeg-9.dll
windows10-2004-x64
1libpng16-16.dll
windows10-2004-x64
1libtiff-5.dll
windows10-2004-x64
1libwebp-7.dll
windows10-2004-x64
1res/fonts/...se.ttf
windows10-2004-x64
7res/sounds/click.wav
windows10-2004-x64
6res/sounds/fall.ps1
windows10-2004-x64
1res/sounds/hit.wav
windows10-2004-x64
6res/sounds/jump.wav
windows10-2004-x64
6res/textur...ow.png
windows10-2004-x64
3res/textur...ay.png
windows10-2004-x64
3res/textur...er.png
windows10-2004-x64
3res/textur...le.png
windows10-2004-x64
3res/textur...ft.png
windows10-2004-x64
3res/textur...ht.png
windows10-2004-x64
3res/textur...ox.png
windows10-2004-x64
3res/textures/logo.png
windows10-2004-x64
3res/textur..._0.png
windows10-2004-x64
3res/textur..._1.png
windows10-2004-x64
3res/textur..._2.png
windows10-2004-x64
3res/textur..._3.png
windows10-2004-x64
3res/textur..._4.png
windows10-2004-x64
3zlib1.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
Cursor-Custodian-Windows.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Cursor Custodian.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
SDL2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
SDL2_image.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
SDL2_mixer.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
SDL2_ttf.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
libfreetype-6.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
libjpeg-9.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
libpng16-16.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
libtiff-5.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
libwebp-7.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
res/fonts/cocogoose.ttf
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
res/sounds/click.wav
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
res/sounds/fall.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
res/sounds/hit.wav
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
res/sounds/jump.wav
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
res/textures/arrow.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
res/textures/death_overlay.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
res/textures/ground/center.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
res/textures/ground/hole.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
res/textures/ground/left.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
res/textures/ground/right.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
res/textures/highscore_box.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
res/textures/logo.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
res/textures/player/player_0.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
res/textures/player/player_1.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
res/textures/player/player_2.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
res/textures/player/player_3.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
res/textures/player/player_4.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
zlib1.dll
Resource
win10v2004-20240226-en
General
-
Target
res/sounds/hit.wav
-
Size
17KB
-
MD5
d99971cfda4d1de2b729fa6e50e93c85
-
SHA1
1e6eee4270bfb978675c8b4c19e07f9da10a49e5
-
SHA256
f6c1d4540cd0229eace2bccee828dc3464f9f5e3cac3fd35ea905eb4bc2da4e3
-
SHA512
b3aef18a31c7ae0a8fd7cd8f18fb3a206ac6af0981d7c7b469b62bb48e4b2b437d74c6074e7c9879fb08d35ff4c1d1576186d03a409e894969cd8ed04c29940c
-
SSDEEP
384:bK2fygH1NJeDWll0G+59hak83+5fPco/ExSOqI:e0nNJue+fhan3+5fko/sqI
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4232 unregmp2.exe Token: SeCreatePagefilePrivilege 4232 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1364 4360 wmplayer.exe 89 PID 4360 wrote to memory of 1364 4360 wmplayer.exe 89 PID 4360 wrote to memory of 1364 4360 wmplayer.exe 89 PID 4360 wrote to memory of 2552 4360 wmplayer.exe 90 PID 4360 wrote to memory of 2552 4360 wmplayer.exe 90 PID 4360 wrote to memory of 2552 4360 wmplayer.exe 90 PID 2552 wrote to memory of 4232 2552 unregmp2.exe 91 PID 2552 wrote to memory of 4232 2552 unregmp2.exe 91
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\res\sounds\hit.wav"1⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\res\sounds\hit.wav"2⤵PID:1364
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD52b7b9ab5df4587f7c018eabb6b4ba504
SHA18b579c72e51c0128cb0c5aecaee2abb7fbdbc303
SHA25637814dfb490f92de8f6e5a10c9a31b2ddf24f6d6c44849658d3c180441e25068
SHA5120702e2079926d5bf5556fa9143d86c1854ab28dd9d79db9765588a34dfea0e38e2206311a2fd67cb472925e56532a2449c280a353a1372d2be92c517b793c596