Analysis
-
max time kernel
36s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
VID_10221125_213903_010.avi
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VID_10221125_213903_010.avi
Resource
win10v2004-20240508-en
General
-
Target
VID_10221125_213903_010.avi
-
Size
82.0MB
-
MD5
b7990648c6f29fbb6014f0bd8bfd325f
-
SHA1
e559a98927d3efa31864f00d2e184bad72720219
-
SHA256
e59b7823d3fe310de5c2efddee12b7ff53baf5eae0b24b90a13ac1347e1b451d
-
SHA512
58b6180941ccd234349e062156116ddbe105137cc4325874c1786c357ce76f94629bf59f37a9bbb341d822755b0a02cc7fe4eb7d0439cdb931be50e7fc86eb68
-
SSDEEP
1572864:8vMvKqOSdzhGAArvWlhXYNKQQdOqdHCnbv8yejSTchvKY4cZdGAU3Ff8e+uHjM+N:8vKXOSzhGJsFs8HinbvASodFhZdDYf7B
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5064 unregmp2.exe Token: SeCreatePagefilePrivilege 5064 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 712 wrote to memory of 1392 712 wmplayer.exe 82 PID 712 wrote to memory of 1392 712 wmplayer.exe 82 PID 712 wrote to memory of 1392 712 wmplayer.exe 82 PID 712 wrote to memory of 2752 712 wmplayer.exe 83 PID 712 wrote to memory of 2752 712 wmplayer.exe 83 PID 712 wrote to memory of 2752 712 wmplayer.exe 83 PID 2752 wrote to memory of 5064 2752 unregmp2.exe 84 PID 2752 wrote to memory of 5064 2752 unregmp2.exe 84
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:8 /Open "C:\Users\Admin\AppData\Local\Temp\VID_10221125_213903_010.avi"1⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:8 /Open "C:\Users\Admin\AppData\Local\Temp\VID_10221125_213903_010.avi"2⤵PID:1392
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD52eb34438fa8e92f70d0203c8b76dfe67
SHA127a1b657256dd31f20f3d718c9472929d2c75f96
SHA256c9d3bb454eb60573e7d944294a9f0af48c625e43b4a06daac1776bb89c09ccdd
SHA512529691229e0290df22c870de2946f7e1b0cad915c1a0f22e331bc7ff73e3f833dab2302d8b01ff7c3452e34b6fc738bc6ed04b914ba0ac9cf9f5b3480f73f394