Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/03/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
heheman.bat
Resource
win11-20240221-en
General
-
Target
heheman.bat
-
Size
30B
-
MD5
0cfd83d222033e9ee666e2ceb8e950db
-
SHA1
83167b94d243c3715136a8b2d9612d493674fdb3
-
SHA256
63e3e8797f166b791671e9181cd65b5c6e40a3ebbd8aae405bacf56516972868
-
SHA512
a3d0a51ee25a872f0531c96e5650c3a1051dccb0aa47b7b55812678dda3a0fdf5b867d4d41a11522322e520a5005ad5b607669c8cfaecab93a21ca492a432471
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3784 SystemSettingsAdminFlows.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: cmd.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\F: SystemSettingsAdminFlows.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 332 unregmp2.exe Token: SeCreatePagefilePrivilege 332 unregmp2.exe Token: SeBackupPrivilege 3784 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3784 SystemSettingsAdminFlows.exe Token: SeSystemEnvironmentPrivilege 3784 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 3784 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3784 SystemSettingsAdminFlows.exe Token: SeSecurityPrivilege 3784 SystemSettingsAdminFlows.exe Token: SeTakeOwnershipPrivilege 3784 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 3784 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 3784 SystemSettingsAdminFlows.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3784 SystemSettingsAdminFlows.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3320 4068 wmplayer.exe 85 PID 4068 wrote to memory of 3320 4068 wmplayer.exe 85 PID 4068 wrote to memory of 3320 4068 wmplayer.exe 85 PID 4068 wrote to memory of 1584 4068 wmplayer.exe 86 PID 4068 wrote to memory of 1584 4068 wmplayer.exe 86 PID 4068 wrote to memory of 1584 4068 wmplayer.exe 86 PID 1584 wrote to memory of 332 1584 unregmp2.exe 87 PID 1584 wrote to memory of 332 1584 unregmp2.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\heheman.bat"1⤵
- Enumerates connected drives
PID:4016
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵PID:3320
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3612
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4780
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:3280
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2144
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3784
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1496
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d2ef79666180e535690b6c2cac188b72
SHA147e9bad5f130d9c78d59d34e06eff9d80ae534d3
SHA2569913254ed01bdd8987c352aeea8e2bfdf79c55cd26314300c03d3b0bbbfd2f02
SHA512c77b0b44e5797467c5ddca1de8bb6c63633e05a1e30101948cf0ee581ddc6507d05f66bd709e666f5785f46838d5fdaf602172186189fcdadcfb626c40c61e4e
-
Filesize
706B
MD5315ab4400f8cddc5d026e5114b6ef932
SHA135c3db05004f6f5bc36cdaeb7c3c62425d649b5e
SHA256cf95adc2073f69aabebfa8d4305aa6a6903bc26b8281c56a68de6a2bca3c263c
SHA512f505611bdbce04874b93a5f19ce657f2d14bab1febefa081835ff7f0191bb7ec0305834ba561f4010543271a7a2d0e9ba36b0fdd70e74147aba7eed029f9969e
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD525f02fc698a77c547ca4c00584369762
SHA15b41953edd663fccecd03d8440fec5dbe8bb4636
SHA25604d429df4e1ddf96d3d4f35186e5d55227741b382e8920aa8bc62da1957dc0a9
SHA512d558e6b20989d72d5834d0bbfee8189eaa69bcec1db5b1dce958503ba2b00c596c212c6ccdcf559fef2d64f493bdd7ae77098c04db6c455e76873ff194634264
-
Filesize
148KB
MD53de653713e705e001c3f0be1efc51ed3
SHA163565592c266226d36604933e51725e90010da25
SHA256c78ebef77e03135b3cea0705d4c259d782ed80746faea4e9f4a851e494fa94f9
SHA5127db1063fa2a7c0bcf394d7a20984ab1b501cb24fae5e801addace77424ba773c948a87d8c3fb38f06366b1478f70ba0278c48f219d224ff6e904ff2ee161fb4e