Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 20:03

General

  • Target

    Best FiveM Cheat - Susano Complete Guide!.mp4

  • Size

    12.4MB

  • MD5

    fc7990e50b086b1ba36aa8e927060108

  • SHA1

    81a972836392cdd72709d7a593abdba9672f3c1f

  • SHA256

    e2555106a742d7aa613d11c676c72242b28ec1fc2537821639a852e1e7d17e4c

  • SHA512

    2a2e73d03053a76276367265ad03d6754f04f1bbfec01c40173ed9db7950c4cc81c577c30878463b67aae20621ac4d3fd51464a9de1399315deffe19f2427c5a

  • SSDEEP

    393216:YUTW+F14tEcbm2Vf/JTz3k+BtvI5ShBYjuxrLCOkL3Doj:YeAbm2x/JTrdgkMaLlkLcj

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Best FiveM Cheat - Susano Complete Guide!.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Best FiveM Cheat - Susano Complete Guide!.mp4"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3156
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:1708
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Best FiveM Cheat - Susano Complete Guide!.mp4"
        3⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2028
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3976,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:8
    1⤵
      PID:232
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
      1⤵
      • Drops file in Windows directory
      PID:4056
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x548 0x520
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      384KB

      MD5

      c7ca2711d80cd052da0d98ce7e6dec6b

      SHA1

      b051f0425224cf70e3a10636c21bf113bd1cd301

      SHA256

      a0c1147d7f6adb99735dc3fa370ef6fb8e6ddd3687eb7afd677af5c71df6957f

      SHA512

      487b985fe8a4fb9a0cb59ffb0b485133e0b089115e36b9bc3f0cbb64babd899daf1b282a9554b45874a59a4c7d9c07db370650c28a5731bde50f52e66a0fc0af

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      1024KB

      MD5

      c35d58a921b1d4278f491575442a591a

      SHA1

      bc3aaf57ab05904ca284cec1ffe529fbad4cd5a9

      SHA256

      aac00c6f62c5df8c9d6e7e7f80ad39ed462af6c62d7bdc5311428f2209409521

      SHA512

      eef3b75c527c6b0c7c95b52f62aa47dc678332611666086c033dc74d5e0853beeec2e809a4fe67d565b30d42f72969df368d5856f20c308bae4edccce52fba22

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

      Filesize

      68KB

      MD5

      6f0a685f623c4050f7a4fa336bef5362

      SHA1

      a0789a5c869650aef03f37a28775aff2ede21c1c

      SHA256

      30f5feb178b183704e2817edf5ae4192c04683eadc77dd9b65f1c819b2d94667

      SHA512

      2dd1d22c662cdba736d898ffe65a9b634f8b8184170ce3f2a48c32b8255a1812faf377f30557e9a26052a6189ffba9f2b7a710dcdcfe48e71df66941f3484439

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      b42be813dc68b9d884d8079ec48a184a

      SHA1

      794cd606bd8e84cb37b1626a1dc55a82253530bf

      SHA256

      b38ef115a44acf180f55d0b100e910c40c3f9ebaf8758e1d131fd027bfeade3c

      SHA512

      77256086f2d00cdd377bfd24a307e94a9aefe3addca962e8dcd0f15eff8d8fef24b038b663e12099a4901eac5cdff3f97e025776e8b22eedc609fcfbee4b5390

    • memory/2028-48-0x0000000005620000-0x0000000005630000-memory.dmp

      Filesize

      64KB

    • memory/2028-46-0x0000000003A50000-0x0000000003A60000-memory.dmp

      Filesize

      64KB

    • memory/2028-47-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB

    • memory/2028-44-0x0000000003A50000-0x0000000003A60000-memory.dmp

      Filesize

      64KB

    • memory/2028-49-0x0000000005620000-0x0000000005630000-memory.dmp

      Filesize

      64KB

    • memory/2028-51-0x0000000003A50000-0x0000000003A60000-memory.dmp

      Filesize

      64KB

    • memory/2028-50-0x0000000003A50000-0x0000000003A60000-memory.dmp

      Filesize

      64KB

    • memory/2028-52-0x0000000005620000-0x0000000005630000-memory.dmp

      Filesize

      64KB

    • memory/2028-45-0x0000000003A50000-0x0000000003A60000-memory.dmp

      Filesize

      64KB

    • memory/2028-43-0x0000000003A50000-0x0000000003A60000-memory.dmp

      Filesize

      64KB

    • memory/2028-68-0x0000000003CC0000-0x0000000003CD0000-memory.dmp

      Filesize

      64KB

    • memory/2028-76-0x0000000003CC0000-0x0000000003CD0000-memory.dmp

      Filesize

      64KB

    • memory/2028-77-0x0000000003CC0000-0x0000000003CD0000-memory.dmp

      Filesize

      64KB