Overview
overview
7Static
static
3reaper716_...ll.exe
windows10-1703-x64
7$INSTDIR$_....0.zip
windows10-1703-x64
1$INSTDIR$_....0.zip
windows10-1703-x64
1$INSTDIR$_...eabank
windows10-1703-x64
3$INSTDIR$_...xe.wav
windows10-1703-x64
1$INSTDIR$_...an.wav
windows10-1703-x64
1$INSTDIR$_...mp.wav
windows10-1703-x64
1$INSTDIR$_...70.wav
windows10-1703-x64
6$INSTDIR$_...mp.wav
windows10-1703-x64
1$INSTDIR$_...70.wav
windows10-1703-x64
1$INSTDIR$_...in.wav
windows10-1703-x64
1$INSTDIR$_...xe.wav
windows10-1703-x64
6$INSTDIR$_...in.wav
windows10-1703-x64
1$INSTDIR$_...in.wav
windows10-1703-x64
1$INSTDIR$_...in.wav
windows10-1703-x64
1$INSTDIR$_...30.wav
windows10-1703-x64
1$INSTDIR$_...ng.txt
windows10-1703-x64
1$INSTDIR$_...ic.txt
windows10-1703-x64
1$INSTDIR$_...an.txt
windows10-1703-x64
1$INSTDIR$_...or.txt
windows10-1703-x64
1$INSTDIR$_...an.txt
windows10-1703-x64
1$INSTDIR$_...an.txt
windows10-1703-x64
1$INSTDIR$_...or.txt
windows10-1703-x64
1$INSTDIR$_...or.txt
windows10-1703-x64
1$INSTDIR$_...an.txt
windows10-1703-x64
1$INSTDIR$_...or.txt
windows10-1703-x64
1$INSTDIR$_...or.txt
windows10-1703-x64
1$INSTDIR$_...or.txt
windows10-1703-x64
1$INSTDIR$_...an.txt
windows10-1703-x64
1$INSTDIR$_...ne.txt
windows10-1703-x64
1$INSTDIR$_...es.txt
windows10-1703-x64
1$INSTDIR$_... 1.txt
windows10-1703-x64
1Analysis
-
max time kernel
1781s -
max time network
1583s -
platform
windows10-1703_x64 -
resource
win10-20240611-es -
resource tags
arch:x64arch:x86image:win10-20240611-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
20-06-2024 08:57
Behavioral task
behavioral1
Sample
reaper716_x64-install.exe
Resource
win10-20240404-es
Behavioral task
behavioral2
Sample
$INSTDIR$_8_/ColorThemes/Default_6.0.zip
Resource
win10-20240404-es
Behavioral task
behavioral3
Sample
$INSTDIR$_8_/ColorThemes/Default_7.0.zip
Resource
win10-20240404-es
Behavioral task
behavioral4
Sample
$INSTDIR$_8_/Data/GM.reabank
Resource
win10-20240404-es
Behavioral task
behavioral5
Sample
$INSTDIR$_8_/Data/amp_models/Dumble Overdrive Special - Tweed Deluxe.wav
Resource
win10-20240404-es
Behavioral task
behavioral6
Sample
$INSTDIR$_8_/Data/amp_models/Fender Bassman - Fender Bassman.wav
Resource
win10-20240404-es
Behavioral task
behavioral7
Sample
$INSTDIR$_8_/Data/amp_models/Fender Bassman - Tweed Champ.wav
Resource
win10-20240404-es
Behavioral task
behavioral8
Sample
$INSTDIR$_8_/Data/amp_models/Fender Deluxe - Marshall Stock 70.wav
Resource
win10-20240611-es
Behavioral task
behavioral9
Sample
$INSTDIR$_8_/Data/amp_models/Fender Deluxe - Tweed Champ.wav
Resource
win10-20240404-es
Behavioral task
behavioral10
Sample
$INSTDIR$_8_/Data/amp_models/Marshall JCM800 - Marshall Stock 70.wav
Resource
win10-20240404-es
Behavioral task
behavioral11
Sample
$INSTDIR$_8_/Data/amp_models/Marshall JCM800 - Matchless Chieftain.wav
Resource
win10-20240404-es
Behavioral task
behavioral12
Sample
$INSTDIR$_8_/Data/amp_models/Marshall JTM45 - Blackface Deluxe.wav
Resource
win10-20240404-es
Behavioral task
behavioral13
Sample
$INSTDIR$_8_/Data/amp_models/Marshall JTM45 - Matchless Chieftain.wav
Resource
win10-20240404-es
Behavioral task
behavioral14
Sample
$INSTDIR$_8_/Data/amp_models/Mesa Boogie Clean - Blackface Twin.wav
Resource
win10-20240404-es
Behavioral task
behavioral15
Sample
$INSTDIR$_8_/Data/amp_models/Mesa Boogie Clean - Matchless Chieftain.wav
Resource
win10-20240404-es
Behavioral task
behavioral16
Sample
$INSTDIR$_8_/Data/amp_models/Vox AC30 Non Top Boost - Vox AC30.wav
Resource
win10-20240404-es
Behavioral task
behavioral17
Sample
$INSTDIR$_8_/Data/ix_keymaps/00 - Default Mapping.txt
Resource
win10-20240611-es
Behavioral task
behavioral18
Sample
$INSTDIR$_8_/Data/ix_scales/Chromatic.txt
Resource
win10-20240404-es
Behavioral task
behavioral19
Sample
$INSTDIR$_8_/Data/ix_scales/Dorian.txt
Resource
win10-20240404-es
Behavioral task
behavioral20
Sample
$INSTDIR$_8_/Data/ix_scales/Harmonic Minor.txt
Resource
win10-20240404-es
Behavioral task
behavioral21
Sample
$INSTDIR$_8_/Data/ix_scales/Locrian.txt
Resource
win10-20240404-es
Behavioral task
behavioral22
Sample
$INSTDIR$_8_/Data/ix_scales/Lydian.txt
Resource
win10-20240404-es
Behavioral task
behavioral23
Sample
$INSTDIR$_8_/Data/ix_scales/Major.txt
Resource
win10-20240404-es
Behavioral task
behavioral24
Sample
$INSTDIR$_8_/Data/ix_scales/Melodic Minor.txt
Resource
win10-20240404-es
Behavioral task
behavioral25
Sample
$INSTDIR$_8_/Data/ix_scales/Mixolydian.txt
Resource
win10-20240404-es
Behavioral task
behavioral26
Sample
$INSTDIR$_8_/Data/ix_scales/Natural Minor.txt
Resource
win10-20240611-es
Behavioral task
behavioral27
Sample
$INSTDIR$_8_/Data/ix_scales/Pentatonic Major.txt
Resource
win10-20240404-es
Behavioral task
behavioral28
Sample
$INSTDIR$_8_/Data/ix_scales/Pentatonic Minor.txt
Resource
win10-20240611-es
Behavioral task
behavioral29
Sample
$INSTDIR$_8_/Data/ix_scales/Phrygian.txt
Resource
win10-20240404-es
Behavioral task
behavioral30
Sample
$INSTDIR$_8_/Data/ix_scales/Whole Tone.txt
Resource
win10-20240404-es
Behavioral task
behavioral31
Sample
$INSTDIR$_8_/Data/ix_sequences/1 - All Notes.txt
Resource
win10-20240404-es
Behavioral task
behavioral32
Sample
$INSTDIR$_8_/Data/ix_sequences/2 - Accent on 1.txt
Resource
win10-20240404-es
General
-
Target
$INSTDIR$_8_/Data/amp_models/Fender Deluxe - Marshall Stock 70.wav
-
Size
4KB
-
MD5
87638bf2893031b221af0922e973e21d
-
SHA1
da6640fe9cad53093a656f0d8656812813626ace
-
SHA256
59b067e001e9425b4c165b9a71ca5e0ea1aa839633dbe4252660c3fe87da1596
-
SHA512
f4d97c781b3f0e818b1d11e0a3744548d6603039fdecfe885b650c571bcb8bc6a86002f2b89785a9b40395a751b5c7801bb2c5280680e20c4bbbfafa074c8baf
-
SSDEEP
24:7n03rCHcYcdrStDrKb92ejtr3teZEbmfn7u:703ocYAw3Kb9JWGbh
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1940 wmplayer.exe Token: SeCreatePagefilePrivilege 1940 wmplayer.exe Token: SeShutdownPrivilege 4468 unregmp2.exe Token: SeCreatePagefilePrivilege 4468 unregmp2.exe Token: 33 3348 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3348 AUDIODG.EXE Token: SeShutdownPrivilege 1940 wmplayer.exe Token: SeCreatePagefilePrivilege 1940 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4872 1940 wmplayer.exe 71 PID 1940 wrote to memory of 4872 1940 wmplayer.exe 71 PID 1940 wrote to memory of 4872 1940 wmplayer.exe 71 PID 4872 wrote to memory of 4468 4872 unregmp2.exe 72 PID 4872 wrote to memory of 4468 4872 unregmp2.exe 72
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\$INSTDIR$_8_\Data\amp_models\Fender Deluxe - Marshall Stock 70.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
- Drops file in Windows directory
PID:168
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4041⤵
- Suspicious use of AdjustPrivilegeToken
PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58a538564491534b0ee5c0a6177c8bb34
SHA1a016f8134927292b0bd38079f58649b2b29e5292
SHA256fb382afe7d90c65908eb3fcfbc5c0f936288c238ae4685d76ef9a219360c8bff
SHA5126b2af42fb0eb5ede3ce3e06bf17d43f7a1684e35f1a0a1f3057a33df46f0668b7be49ce2781da86950c8c26253a1bf904019cc33c57030ee81db289b53c80f08
-
Filesize
1024KB
MD5741c860bb9ae5891a6d062d82edb6717
SHA1940f2b2cac55ab6d5dd6fabcffb92992bb9687a0
SHA256f369b934f994a83675588e043840911f86451f53087c8e92c0c2579ba1f99d0b
SHA5125beca1156d9ca80fd551db73143a9258a464a5fa203cbbf09cf40cd5f625d5fc6c9b6d431e3ca2d164f6589e685db4351eadb3e2085fb9955f468a97b1196f8f
-
Filesize
68KB
MD56410c581643b840145fd2a67abcb6b88
SHA16ab59bf2a71ace967b14f6ff838467faf911caa1
SHA2568644d60cd59160b5ed6d7226a51c9c42518ca41e7c75c3e843bcf8cd7b303296
SHA51214d85454480809d25837bc594984262e168bc970da4705769fba198f6eb3598dc43ee6f11051ec180f06a53ba5353232671037c0446af2a65c9826df3e016ddf
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5f8ecd9fddf5598df083e722310f3b610
SHA13c475ec36fab7fcec45f1c6297974e86307d2fe8
SHA256862f9cd28ec06d90fac589bc6226e3aade4058cdd4aa029e61abda57b6c7519a
SHA512f088dfc9148b75443d96f0527cbf7b43713fd53fe1dac6f414df133c008021264e0ff4e70a69dac9284dc49228f65cc9ceaa65b08e2fac873a0e775a2ac62817