Analysis
-
max time kernel
54s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
Recording 2024-07-05 120024.mp4
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Recording 2024-07-05 120024.mp4
Resource
win10v2004-20240508-en
General
-
Target
Recording 2024-07-05 120024.mp4
-
Size
7.0MB
-
MD5
ca6bacbede222729f52a59a47245e51b
-
SHA1
dbdef42f1ddd48c08ed226cb31661649d398b984
-
SHA256
5d1eaa39b85337b3e6d5a6c2d0977dbd750cfb4aa5ed0d02ea47702c3042e7c5
-
SHA512
4fb1e078e268c7a7499f07892ad14bb1d8762ac79518850eb688a5e6fedbcbcf331a5a583f4f86eb9c4c83d443dfd2b1ce2f926caabd8a4bdb8634a448b6781e
-
SSDEEP
98304:Rx4A59rW9ci/dnenqSFBplIwazug9iNJS1IANZFXzHdy2btXiVbaFCe4:RxXy9ynt7lDacS1dNZiy5Ob7n
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4348 unregmp2.exe Token: SeCreatePagefilePrivilege 4348 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4380 wrote to memory of 2992 4380 wmplayer.exe 80 PID 4380 wrote to memory of 2992 4380 wmplayer.exe 80 PID 4380 wrote to memory of 2992 4380 wmplayer.exe 80 PID 4380 wrote to memory of 388 4380 wmplayer.exe 81 PID 4380 wrote to memory of 388 4380 wmplayer.exe 81 PID 4380 wrote to memory of 388 4380 wmplayer.exe 81 PID 388 wrote to memory of 4348 388 unregmp2.exe 82 PID 388 wrote to memory of 4348 388 unregmp2.exe 82
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Recording 2024-07-05 120024.mp4"1⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Recording 2024-07-05 120024.mp4"2⤵PID:2992
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD582afb9dc5e51ad3b2c1695ddf9bf4881
SHA1c3867fb6cbc2932fa81474ec93e77e7be25d976f
SHA256a2e9a26e9b0038253f615c78447fe1cc3c3856d54112a5d00f30711acd33e259
SHA5124086d2136ccbe84bff7295aa20f4c6e367403ef34e6900ae69901bf264904cc8747472aabf76701d9febef9872ad9890e94c98c724ffdef68b99f3f0bad2abf5
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5f508970088402b43d882002a07d6a61a
SHA16996dc61dc067f15a83978d8951b78cf7f441a1c
SHA2567cc841e6fb69fd9975a648a10bb38257d44b8b1f3dd31e4e7973d680bce7dc37
SHA5126a062f18043c8f6d45d5b969441c34d3959933c8f188213e55aee113f69720cfd631e50ab7a98bfc969cf1dbd41698a716c2773d9554cee1b40edbd5a39e0f02