Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 01:57
Behavioral task
behavioral1
Sample
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe
Resource
win10v2004-20240508-en
General
-
Target
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe
-
Size
5.4MB
-
MD5
2cf8e658c125ab577a4796a7e58e03ae
-
SHA1
ad6e809d428862584d327f570693effd223c9944
-
SHA256
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6
-
SHA512
9cfff2e8c7ff373c9d39dc563e80773c0a2b727f76aeea17e1cb6877afe1c55067f92076ed2c20164b21a9ad3dcc00948c01ee40de68ea30d8db67d2aa8de5fb
-
SSDEEP
98304:n2kVbc4gkJBAUZLDATC2oLbxLeORVOumgkGUa0o:lwDkJV/AG2oLb0OHmWn0o
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Program Files\Windows Media Player\wmplayer\wmplayer.exe detect_ak_stuff -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe -
Executes dropped EXE 1 IoCs
Processes:
wmplayer.exepid process 3764 wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exewmplayer.exedescription ioc process File opened (read-only) \??\S: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\P: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\Y: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\Z: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\W: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\M: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\U: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\E: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\I: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\L: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\O: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\X: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\H: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\J: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Q: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\K: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\N: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\V: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\B: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened (read-only) \??\R: 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
wmplayer.exedescription ioc process File opened for modification \??\PhysicalDrive0 wmplayer.exe -
Drops file in Program Files directory 4 IoCs
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exewmplayer.exedescription ioc process File opened for modification C:\Program Files\Windows Media Player\wmplayer\LSML\ 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer\ 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File created C:\Program Files\Windows Media Player\wmplayer\wmplayer.exe 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer\LSML\PZ.w wmplayer.exe -
Drops file in Windows directory 2 IoCs
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exewmplayer.exedescription ioc process File opened for modification C:\Windows\RECYCLE.BIN 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe File opened for modification C:\Windows\RECYCLE.BIN wmplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exewmplayer.exepid process 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe 3764 wmplayer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exewmplayer.exepid process 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 4736 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 4736 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 3764 wmplayer.exe 3764 wmplayer.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.execmd.execmd.exewmplayer.execmd.exedescription pid process target process PID 4640 wrote to memory of 4736 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe PID 4640 wrote to memory of 4736 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe PID 4640 wrote to memory of 4736 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe PID 4640 wrote to memory of 4012 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 4012 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 4012 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4012 wrote to memory of 1280 4012 cmd.exe schtasks.exe PID 4012 wrote to memory of 1280 4012 cmd.exe schtasks.exe PID 4012 wrote to memory of 1280 4012 cmd.exe schtasks.exe PID 4640 wrote to memory of 3676 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 3676 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 3676 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 3676 wrote to memory of 3132 3676 cmd.exe schtasks.exe PID 3676 wrote to memory of 3132 3676 cmd.exe schtasks.exe PID 3676 wrote to memory of 3132 3676 cmd.exe schtasks.exe PID 4640 wrote to memory of 4488 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 4488 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 4488 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe cmd.exe PID 4640 wrote to memory of 3764 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe wmplayer.exe PID 4640 wrote to memory of 3764 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe wmplayer.exe PID 4640 wrote to memory of 3764 4640 2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe wmplayer.exe PID 3764 wrote to memory of 944 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 944 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 944 3764 wmplayer.exe svchost.exe PID 4488 wrote to memory of 3400 4488 cmd.exe reg.exe PID 4488 wrote to memory of 3400 4488 cmd.exe reg.exe PID 4488 wrote to memory of 3400 4488 cmd.exe reg.exe PID 3764 wrote to memory of 3432 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3432 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3432 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1636 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1636 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1636 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 2784 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 2784 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 2784 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 4448 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 4448 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 4448 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 4592 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 4592 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 4592 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3108 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3108 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3108 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3448 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3448 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 3448 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1800 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1800 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1800 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1960 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1960 3764 wmplayer.exe svchost.exe PID 3764 wrote to memory of 1960 3764 wmplayer.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe"C:\Users\Admin\AppData\Local\Temp\2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exeC:\Users\Admin\AppData\Local\Temp\2bc68cb6d702f6e11d5df761da13d323012912421c6fb32c7a0e32847e0ea6d6.exe2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /delete /tn WindowsMediaPlayer /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn WindowsMediaPlayer /f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /tn WindowsMediaPlayer /tr "\"C:\Program Files\Windows Media Player\wmplayer\wmplayer.exe\"" /SC ONLOGON /delay 0000:03 /RL HIGHEST2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn WindowsMediaPlayer /tr "\"C:\Program Files\Windows Media Player\wmplayer\wmplayer.exe\"" /SC ONLOGON /delay 0000:03 /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /d 1 /t REG_DWORD /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /d 1 /t REG_DWORD /f3⤵
-
C:\Program Files\Windows Media Player\wmplayer\wmplayer.exe"C:\Program Files\Windows Media Player\wmplayer\wmplayer.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Windows Media Player\wmplayer\wmplayer.exeFilesize
3.4MB
MD5785124e9e0ab753f092765d87db2e6c5
SHA1134dc470100b161a9d532608525d81a7e4abb671
SHA2568c597cb6a277c0a0527bf287cb1612ab8a70df4b938603eaaf3f404bbd90d336
SHA512bf48d9cb3179c4aa1a2d91798c22a58532f31d36194a52c195aa138773e97359e07d82c3679547e299f10a4dc261712a9ee1c8c8e51037c63251dc00d713477b
-
C:\Windows\RECYCLE.BINFilesize
451B
MD5cc99b98acccbc375c5b1ff7485d52fb7
SHA1484dc697d64625b37cc9e53e5108d3b2530dabf4
SHA256dcb786e381fae3c782fe8059b9b87257bbb04e5f4dbb2ccd73acacce3961ceb7
SHA512c60da6bfa5a30512c09b105ee51da3c9c44f428c190412550e07e76e1383bc49ae70b84f7b56b6953c9b30c7fa3ba4dbed3efd822c8b9ea07f9662520925e9ba
-
C:\Windows\RECYCLE.BINFilesize
536B
MD5b062e828ed7652ffa91ea845d0ef1bf1
SHA13c37e9c764f9748002491be2d19154ed812d4d19
SHA256067e24d6a1ab178976b85e286dd39517799c277a40c1965afc7807714405ff51
SHA5124703fbb56c0b84cf8002ca653703dae4e2ba0d013703affbbeb5c1260f0b2cf830469b6349765f0de7ccde82e215c2c2b3398e1842976c61516cfa2be3787ba9