Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
Clone_me.mp3
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Clone_me.mp3
Resource
win10v2004-20240611-en
General
-
Target
Clone_me.mp3
-
Size
3.5MB
-
MD5
750cd2a4e25986919fe415177c73e422
-
SHA1
39c0cdafe05c1ae58f4057eba7e95cae94c92962
-
SHA256
5b6d4e4c61de26de9cc2c969192c6740a473a6e41a859b068a66950583465717
-
SHA512
3ca5ae7fdb17dd379d5daea854f8f27e6e60f18d7549913b5457e1348015f58cb31d6ae6b4423b4baa4f2158bd613978b69fc1faa55f671a29ef82355ae9749c
-
SSDEEP
98304:8POdTQNu5IoAHs+qCVwprXGSzl6etvOTQ86:8GdTQNu5bAHsMwVWw63TX6
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 224 unregmp2.exe Token: SeCreatePagefilePrivilege 224 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4468 4272 wmplayer.exe 82 PID 4272 wrote to memory of 4468 4272 wmplayer.exe 82 PID 4272 wrote to memory of 4468 4272 wmplayer.exe 82 PID 4272 wrote to memory of 4044 4272 wmplayer.exe 83 PID 4272 wrote to memory of 4044 4272 wmplayer.exe 83 PID 4272 wrote to memory of 4044 4272 wmplayer.exe 83 PID 4044 wrote to memory of 224 4044 unregmp2.exe 84 PID 4044 wrote to memory of 224 4044 unregmp2.exe 84
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Clone_me.mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Clone_me.mp3"2⤵PID:4468
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD582afb9dc5e51ad3b2c1695ddf9bf4881
SHA1c3867fb6cbc2932fa81474ec93e77e7be25d976f
SHA256a2e9a26e9b0038253f615c78447fe1cc3c3856d54112a5d00f30711acd33e259
SHA5124086d2136ccbe84bff7295aa20f4c6e367403ef34e6900ae69901bf264904cc8747472aabf76701d9febef9872ad9890e94c98c724ffdef68b99f3f0bad2abf5
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD54b105ebae2e9a7cc255fc0cea28a74ff
SHA123216783b9ecfbeb98710b45cec3039b893c2beb
SHA2565278286172322d83272f2270813e68126ae1e71bd2fcba8e606ef0f06fa5b850
SHA512097e639536b3471de9fee7764e0f21a4fe2f317886b359e9d475856677a38b7867ef5a13fb5540597c37b2db0a77149d3a5ae7b497198bef97fa5f4cd544b901