Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/05/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
cardreadertech-AiSR010-decoding-tuto.zip
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
00001_V3.82_18.25.39-websample-singel.wav
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
AiSR-demo.wxt
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
WExtractor 1.42.exe
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
binary-Ascii.txt
Resource
win11-20240508-en
General
-
Target
00001_V3.82_18.25.39-websample-singel.wav
-
Size
3KB
-
MD5
4f18ad8f99b295ea01b48745823818b2
-
SHA1
219b1baf07319bf7447d5341f1e674fa4a85b60d
-
SHA256
c11643df08d2dcf2742cfe1d51b92cd43f2e07cf06ce3d0da64291a783b07b3b
-
SHA512
4c973edd35ecfc737d7c7559af5fa84fc7bb0f21744b792dae3b730ed8987eae4159a8fb967376760d9447883f75e06313f05c4abceafc85a808479d5f036506
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3560 unregmp2.exe Token: SeCreatePagefilePrivilege 3560 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3448 3020 wmplayer.exe 79 PID 3020 wrote to memory of 3448 3020 wmplayer.exe 79 PID 3020 wrote to memory of 3448 3020 wmplayer.exe 79 PID 3020 wrote to memory of 1640 3020 wmplayer.exe 80 PID 3020 wrote to memory of 1640 3020 wmplayer.exe 80 PID 3020 wrote to memory of 1640 3020 wmplayer.exe 80 PID 1640 wrote to memory of 3560 1640 unregmp2.exe 81 PID 1640 wrote to memory of 3560 1640 unregmp2.exe 81
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\00001_V3.82_18.25.39-websample-singel.wav"1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\00001_V3.82_18.25.39-websample-singel.wav"2⤵PID:3448
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD506a09c02e2d203b3caa0c075e687a0c4
SHA18d59caa9db8f11e93774fb19392e2192b98dcefb
SHA25678c6ce168b5c5dcf30951aafdb973ba3cffdeee05ef414f762283f5f19e3e9ef
SHA5126810c8af4a8db23baab88f3d46af936cb70feaae6637caff20e170c29791d3279d691e0d7e00fea796762f5dc4ca600bf9fdf2c9568367cf2f5cb25c36ed687b
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5d7c3d4fbf917451b36c3be11ff56b3b8
SHA13f54b40fc0a8ac13b59af4dde3c38282668d6826
SHA2564c693ee15c4af19654fe9f12dd433cfd6947a3e09285d71db2cc5d1cbc5fcc0b
SHA51263a2430839cac60d8c61e8558653ce4d296db13140945c4ca9df7cb609b40e962708eff75ae4c800ae4c89a61c6492512792aa43b816125d0ee41ab0e9c28682