Analysis
-
max time kernel
187s -
max time network
197s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-07-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
XXXTENTACION.mp3
Resource
win11-20240508-en
General
-
Target
XXXTENTACION.mp3
-
Size
12.6MB
-
MD5
7662d727bc5969773d25a6820fe5dc92
-
SHA1
81d32b12a60114fc32c846cfd22431a9e2142469
-
SHA256
06b3b8358b23ef1bf32396d15ef12398d6fa6fdff39f36c9109f11ed24bbbfd5
-
SHA512
a9bef9381b33f45250976e04e673d7837973d1d30f7c895e74b4df003843a3fa5773adf87de60dd46424ae74668bf31d934a985337a78cb140fc50431ed4dac3
-
SSDEEP
196608:A7hBiRIEPwa4OzqeNPNgunuexxzcp7L25XIRFqSJYp:MiRLf4Hil9Zxy7K5xSq
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4900 unregmp2.exe Token: SeCreatePagefilePrivilege 4900 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 236 wrote to memory of 772 236 wmplayer.exe 77 PID 236 wrote to memory of 772 236 wmplayer.exe 77 PID 236 wrote to memory of 772 236 wmplayer.exe 77 PID 236 wrote to memory of 2000 236 wmplayer.exe 78 PID 236 wrote to memory of 2000 236 wmplayer.exe 78 PID 236 wrote to memory of 2000 236 wmplayer.exe 78 PID 2000 wrote to memory of 4900 2000 unregmp2.exe 79 PID 2000 wrote to memory of 4900 2000 unregmp2.exe 79
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\XXXTENTACION.mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\XXXTENTACION.mp3"2⤵PID:772
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD51553f4412f0373d5333a9f12e49e863c
SHA1c117ef6e8cd55a9bdf974a228bde97aadb440cad
SHA256ffdb9c3d8773e354d5a048e7b48ab4bf684deef7d72482a1762c437ed23d0c8a
SHA512ca76ad53c021753f43c166d147f03b873166c63e494f55e20da0077e96fc8dcb48a4012e94b14ae12cce86dfde5901e53ee233ff72b4d68ae7005d0744103ebe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5399c593d2f790af6f3b1080f0a01cc75
SHA1c665c81d9a803770ee8a85682e3388c3a32eab4a
SHA2565585aec9bf7b07fd314ea0676921ed222e8c937833a8a4681c3171ebcb6adf73
SHA5123bf6312cf3a422917f0dd070ee3d1c05f7f854894abe9fab7c08d5b16bb0e80644b43e59310219b4787924588ec0449ae4d3d003a79a08b909ead70041f2a3f6