Analysis

  • max time kernel
    1781s
  • max time network
    1583s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-es
  • resource tags

    arch:x64arch:x86image:win10-20240611-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    20-06-2024 08:57

General

  • Target

    $INSTDIR$_8_/Data/amp_models/Fender Deluxe - Marshall Stock 70.wav

  • Size

    4KB

  • MD5

    87638bf2893031b221af0922e973e21d

  • SHA1

    da6640fe9cad53093a656f0d8656812813626ace

  • SHA256

    59b067e001e9425b4c165b9a71ca5e0ea1aa839633dbe4252660c3fe87da1596

  • SHA512

    f4d97c781b3f0e818b1d11e0a3744548d6603039fdecfe885b650c571bcb8bc6a86002f2b89785a9b40395a751b5c7801bb2c5280680e20c4bbbfafa074c8baf

  • SSDEEP

    24:7n03rCHcYcdrStDrKb92ejtr3teZEbmfn7u:703ocYAw3Kb9JWGbh

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\$INSTDIR$_8_\Data\amp_models\Fender Deluxe - Marshall Stock 70.wav"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\System32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:168
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x404
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    64KB

    MD5

    8a538564491534b0ee5c0a6177c8bb34

    SHA1

    a016f8134927292b0bd38079f58649b2b29e5292

    SHA256

    fb382afe7d90c65908eb3fcfbc5c0f936288c238ae4685d76ef9a219360c8bff

    SHA512

    6b2af42fb0eb5ede3ce3e06bf17d43f7a1684e35f1a0a1f3057a33df46f0668b7be49ce2781da86950c8c26253a1bf904019cc33c57030ee81db289b53c80f08

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    741c860bb9ae5891a6d062d82edb6717

    SHA1

    940f2b2cac55ab6d5dd6fabcffb92992bb9687a0

    SHA256

    f369b934f994a83675588e043840911f86451f53087c8e92c0c2579ba1f99d0b

    SHA512

    5beca1156d9ca80fd551db73143a9258a464a5fa203cbbf09cf40cd5f625d5fc6c9b6d431e3ca2d164f6589e685db4351eadb3e2085fb9955f468a97b1196f8f

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    6410c581643b840145fd2a67abcb6b88

    SHA1

    6ab59bf2a71ace967b14f6ff838467faf911caa1

    SHA256

    8644d60cd59160b5ed6d7226a51c9c42518ca41e7c75c3e843bcf8cd7b303296

    SHA512

    14d85454480809d25837bc594984262e168bc970da4705769fba198f6eb3598dc43ee6f11051ec180f06a53ba5353232671037c0446af2a65c9826df3e016ddf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    f8ecd9fddf5598df083e722310f3b610

    SHA1

    3c475ec36fab7fcec45f1c6297974e86307d2fe8

    SHA256

    862f9cd28ec06d90fac589bc6226e3aade4058cdd4aa029e61abda57b6c7519a

    SHA512

    f088dfc9148b75443d96f0527cbf7b43713fd53fe1dac6f414df133c008021264e0ff4e70a69dac9284dc49228f65cc9ceaa65b08e2fac873a0e775a2ac62817

  • memory/1940-34-0x0000000008610000-0x0000000008620000-memory.dmp

    Filesize

    64KB

  • memory/1940-35-0x0000000008610000-0x0000000008620000-memory.dmp

    Filesize

    64KB

  • memory/1940-36-0x0000000008610000-0x0000000008620000-memory.dmp

    Filesize

    64KB

  • memory/1940-37-0x0000000008610000-0x0000000008620000-memory.dmp

    Filesize

    64KB

  • memory/1940-39-0x0000000008610000-0x0000000008620000-memory.dmp

    Filesize

    64KB

  • memory/1940-38-0x0000000008610000-0x0000000008620000-memory.dmp

    Filesize

    64KB