Analysis

  • max time kernel
    1376s
  • max time network
    1167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 05:09

General

  • Target

    Goofy Sounds Sample Pack (200+ Sounds Version)/Archery.wav

  • Size

    488KB

  • MD5

    f93dc4d8d0d852e835c446ccda1b0b4e

  • SHA1

    fa3ef81661f8eddfec8c37a8579d3e893d89d6bf

  • SHA256

    39666fe716e8cbc2f19e3a92ea7af273a81518e772c7fdb683cb32127e114afc

  • SHA512

    7a45b1886e566a5c747d462b78032dfa296d33829dbf7daff0a6fbf0af892161650515d431520c3bbaa692ab850fd35ed7821e024c279e61f98e04b6a957a335

  • SSDEEP

    12288:FX5XrL39swsPvuLWViUxBf49rB5BXEEe/E5j8/MeYuE:FXJL393wuLWViaN49/BXxes5jBeW

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\Goofy Sounds Sample Pack (200+ Sounds Version)\Archery.wav"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\Goofy Sounds Sample Pack (200+ Sounds Version)\Archery.wav"
      2⤵
        PID:4104
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      768KB

      MD5

      ad983abe94554a8c0b7bf1aa0a56f3d9

      SHA1

      fc443de092e957639e9f055d4fa5fdaaf20cc259

      SHA256

      122b84632b7774a1f51e93f6ae37e4b60d6a4572ef02161110298d1514bf418d

      SHA512

      fcf2b7721cd4ec767066f6256b0dd311cb78195d93ed952e6c450cfae8b34b964cce73f516432105e0c21f56c1e96beb80fc47dc6de16620d6456302474124e3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      e1f65fe49f91fe69c2f543a404bc554a

      SHA1

      5c5a41ed239d699e633aa666b71181db7e2daef8

      SHA256

      1e498bd34d27939e2a8bbe9d8fd68bf5ec24d495ce790d987cfb8269520058d6

      SHA512

      c6aaa2ee789a2f840bb5e8d13517efd76c4df4ba33f11613431e71bcc583bbf9cdc511ce8131e11d5fd69923d1bb6e6177f5fccd39b8e1805cbf4d45ee9ffdc7