Resubmissions

12/06/2024, 20:14

240612-y1f3hsydla 6

12/06/2024, 20:12

240612-yy42kaycqe 6

Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 20:14

General

  • Target

    clip_12.mp4

  • Size

    62.6MB

  • MD5

    c790f7e78bc06de9b8c1e23e5be7c822

  • SHA1

    a9d73b1901fe9a39b8945fa4299af11416f48eb6

  • SHA256

    008edfc7f5ddee99f159ce144bfea2d812827e79aebe6b2a8e9c997876b280a5

  • SHA512

    2ef762f374a9ea3f26872475b134dd7317f25c8d050798f856771562875352aa3849a1c4811703f32095ebb86da31a5cbb20b4a7b1f7ba18d17581f37804dce3

  • SSDEEP

    1572864:sDy3/lM5Z4BynOjorIBWfO+1QI5PD8eDMIqvR2+kk2wzycGDoehfDIiIFw:sDpTMynOjorISO+P7VDMZ2C2wFGDuhw

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\clip_12.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\clip_12.mp4"
      2⤵
        PID:1476
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4820

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

            Filesize

            256KB

            MD5

            563088ad0f20fabf9dd62c6ba8ae1636

            SHA1

            f9cd2fd153afa1a12ff990cf27c32b8c9c44e878

            SHA256

            eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184

            SHA512

            8229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092

          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

            Filesize

            9KB

            MD5

            7050d5ae8acfbe560fa11073fef8185d

            SHA1

            5bc38e77ff06785fe0aec5a345c4ccd15752560e

            SHA256

            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

            SHA512

            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

          • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

            Filesize

            1KB

            MD5

            437f0c9a9f6f51c54b5d443b08deae25

            SHA1

            d1cc63d774cd357bd5bcc1ea68e4c7cb39d414ce

            SHA256

            3d9353f3bad2acafeeff7e2c21fd7dff16fe3779fb9f2b2322ee722abcf7b7dd

            SHA512

            138c4a56842f3ca6486ead4d2f80b4030fc168131bb21dcc9b18020772d8c67302c10984bc2048ee65dcabaedf820246360a7bf432027b0dbae52a6d092451a1