Analysis

  • max time kernel
    38s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 17:54

General

  • Target

    Powder_2022.06.29_20.53.mp4

  • Size

    5.9MB

  • MD5

    1f11edc0b55112a4964ac2be6e686963

  • SHA1

    60f11ca83d37bf06672fabf540703ec20eb6d9c3

  • SHA256

    dfddb33ec55f3e64b13643bf74741758b59b6e35bc1e6ffe8278d3281f8e8851

  • SHA512

    cad434f9d6a697de7e42b3837f8b6cd571eaeffca1b0e90d1022d53f9ab369f34ddee50f4943f586dacb94f007442a1be98b592f390f77502c6929773f6db592

  • SSDEEP

    98304:Gd1RozaCjH4OTYODuH1QLqFbFszoDtstM0kCsBYoc/EG8lB45Nk39qnZIB0RL7i6:KEYGk1xF7tstM0kCsBYoc/b8liqqv29o

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Powder_2022.06.29_20.53.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Powder_2022.06.29_20.53.mp4"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4364
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:2604
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Powder_2022.06.29_20.53.mp4"
        3⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4152
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:3964
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:1676
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3e0 0x248
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    512KB

    MD5

    26e4064ee797380fa9a8cbb624bd73b2

    SHA1

    4ec24c0ec5b7f2481a7dafd738b199f687b7c531

    SHA256

    47e13bfa02bc2f2892a1599b36ca95f4172fdf75cf4d0ea58fba8ebc1633c85d

    SHA512

    1631279ab6c3b3409235a8c896bba292255b6b67f62d431af51301572c20484f96b2f357ffc818fa9f2d87f7f5bdb12d692ce561d9f71035e16814d8ea7d1590

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    f416cd7efa636df36a5650000a2d4d86

    SHA1

    501e3a668ed7e02100e7b67c09f5884f3e992bc1

    SHA256

    3cce0f36b4b0032089910475d7030ed6d2e6a07ed5f15b7ccc06adf67528bb83

    SHA512

    35a308388cf0a4eb0d2d1cfc89720e8073e06c298a06ba83ad46455f53ee58941cdd2192bc732632912292fcda24678c8a3c13a1cbf987652ef7516f2b4ece3d

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    a3d96bd366b500852a206bc228be78de

    SHA1

    58b3144a477f13323d4f412719945349fd8073cc

    SHA256

    e1c124bea0bdd90a2c30882eca371a952001a8ac1326b043260fdae024eecf43

    SHA512

    979ebdf1923e6279561cc95a2259fd0e5c764bb21e3f4305d13a30f42c779f26762e1413804e212dc2bd858429ab13da56332843f1e5642ccff93feee6d3f9dc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    5227511fe113c6ab4953927590c28479

    SHA1

    2d2d1556adadafba615106351f2957f7a72de9c8

    SHA256

    2d968a1c4702e7bc2d09422b5746224d933548b9c692568b9b43aa807fe427da

    SHA512

    4de05331a9cb1e7b157104c2e0eb88d32ca570172b1bb6d3655e272f2fce24fda0f7c7fde1c679729997692eef838676914144d64231b58f646bef2a768b06fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

    Filesize

    3KB

    MD5

    092ce79fed62e8193452197b9f647d4b

    SHA1

    0d4003ce3127344e7dba04ae3c9ccf8ce9281ff8

    SHA256

    2a919a02e500afce6c2beb175836a355cc5d2d006cf5ea83c0a602569c4e23b8

    SHA512

    6b3937ea45163150bcbabfcb11000dcff0522c79ea3b62922ecec3d0d9da7a987430b048d684dad847d76f4cb86c23b406369528c77bde048332174d6cc362e6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

    Filesize

    1KB

    MD5

    68d7bf9d7c71f494546566c94d805b76

    SHA1

    a72b1ce94b2aa44260060a1b7c822fa1ea29c1b5

    SHA256

    d1bcaed10068d95336c9f1281f630cfcaae631d154b4211fddbf9866fd527cef

    SHA512

    7d420fb5f5ae257c353144199c42f2c0ff241e3e69b285d3f9512727692d0ec472f4b1943c646dcee33f39bb08940eb157b168840640e236cf317d6c44073d8a

  • memory/4152-48-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-57-0x0000000008380000-0x0000000008390000-memory.dmp

    Filesize

    64KB

  • memory/4152-50-0x0000000008370000-0x0000000008380000-memory.dmp

    Filesize

    64KB

  • memory/4152-51-0x0000000008380000-0x0000000008390000-memory.dmp

    Filesize

    64KB

  • memory/4152-52-0x0000000008380000-0x0000000008390000-memory.dmp

    Filesize

    64KB

  • memory/4152-53-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-54-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-55-0x0000000008380000-0x0000000008390000-memory.dmp

    Filesize

    64KB

  • memory/4152-56-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-49-0x0000000008370000-0x0000000008380000-memory.dmp

    Filesize

    64KB

  • memory/4152-58-0x0000000008380000-0x0000000008390000-memory.dmp

    Filesize

    64KB

  • memory/4152-44-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-47-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-42-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-41-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-84-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB

  • memory/4152-85-0x0000000003540000-0x0000000003550000-memory.dmp

    Filesize

    64KB