Resubmissions

12/06/2024, 20:14

240612-y1f3hsydla 6

12/06/2024, 20:12

240612-yy42kaycqe 6

Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 20:14

General

  • Target

    clip_12.mp4

  • Size

    62.6MB

  • MD5

    c790f7e78bc06de9b8c1e23e5be7c822

  • SHA1

    a9d73b1901fe9a39b8945fa4299af11416f48eb6

  • SHA256

    008edfc7f5ddee99f159ce144bfea2d812827e79aebe6b2a8e9c997876b280a5

  • SHA512

    2ef762f374a9ea3f26872475b134dd7317f25c8d050798f856771562875352aa3849a1c4811703f32095ebb86da31a5cbb20b4a7b1f7ba18d17581f37804dce3

  • SSDEEP

    1572864:sDy3/lM5Z4BynOjorIBWfO+1QI5PD8eDMIqvR2+kk2wzycGDoehfDIiIFw:sDpTMynOjorISO+P7VDMZ2C2wFGDuhw

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\clip_12.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\clip_12.mp4"
      2⤵
        PID:1476
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      256KB

      MD5

      563088ad0f20fabf9dd62c6ba8ae1636

      SHA1

      f9cd2fd153afa1a12ff990cf27c32b8c9c44e878

      SHA256

      eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184

      SHA512

      8229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      437f0c9a9f6f51c54b5d443b08deae25

      SHA1

      d1cc63d774cd357bd5bcc1ea68e4c7cb39d414ce

      SHA256

      3d9353f3bad2acafeeff7e2c21fd7dff16fe3779fb9f2b2322ee722abcf7b7dd

      SHA512

      138c4a56842f3ca6486ead4d2f80b4030fc168131bb21dcc9b18020772d8c67302c10984bc2048ee65dcabaedf820246360a7bf432027b0dbae52a6d092451a1