Resubmissions

05-07-2024 15:53

240705-tbt6ma1dlk 8

05-07-2024 15:36

240705-s2d2na1cjl 8

Analysis

  • max time kernel
    54s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 15:36

General

  • Target

    Recording 2024-07-05 120024.mp4

  • Size

    7.0MB

  • MD5

    ca6bacbede222729f52a59a47245e51b

  • SHA1

    dbdef42f1ddd48c08ed226cb31661649d398b984

  • SHA256

    5d1eaa39b85337b3e6d5a6c2d0977dbd750cfb4aa5ed0d02ea47702c3042e7c5

  • SHA512

    4fb1e078e268c7a7499f07892ad14bb1d8762ac79518850eb688a5e6fedbcbcf331a5a583f4f86eb9c4c83d443dfd2b1ce2f926caabd8a4bdb8634a448b6781e

  • SSDEEP

    98304:Rx4A59rW9ci/dnenqSFBplIwazug9iNJS1IANZFXzHdy2btXiVbaFCe4:RxXy9ynt7lDacS1dNZiy5Ob7n

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Recording 2024-07-05 120024.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Recording 2024-07-05 120024.mp4"
      2⤵
        PID:2992
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      384KB

      MD5

      82afb9dc5e51ad3b2c1695ddf9bf4881

      SHA1

      c3867fb6cbc2932fa81474ec93e77e7be25d976f

      SHA256

      a2e9a26e9b0038253f615c78447fe1cc3c3856d54112a5d00f30711acd33e259

      SHA512

      4086d2136ccbe84bff7295aa20f4c6e367403ef34e6900ae69901bf264904cc8747472aabf76701d9febef9872ad9890e94c98c724ffdef68b99f3f0bad2abf5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      f508970088402b43d882002a07d6a61a

      SHA1

      6996dc61dc067f15a83978d8951b78cf7f441a1c

      SHA256

      7cc841e6fb69fd9975a648a10bb38257d44b8b1f3dd31e4e7973d680bce7dc37

      SHA512

      6a062f18043c8f6d45d5b969441c34d3959933c8f188213e55aee113f69720cfd631e50ab7a98bfc969cf1dbd41698a716c2773d9554cee1b40edbd5a39e0f02