Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-25 15-10-28.mkv
Resource
win10v2004-20240709-en
General
-
Target
2024-07-25 15-10-28.mkv
-
Size
9.8MB
-
MD5
c5833e74176ed4c0ebaa634a3f2f240a
-
SHA1
5d92aa0e759f485182a1a1987571f5c7d02105a5
-
SHA256
bad4a35e837b08230daaed38704ad9904e7a6801a0873a44758dfa9a5f532206
-
SHA512
e4a7dfe7b5ffaa9d6bfe5736259a97757ebe8181e6a5938c71936c75b3e7fb05e96f3e692acbf926244dad407e334059384499261ed9a067c00e8ad03b2fe8cc
-
SSDEEP
196608:5YMzyyBPJrqX9gJV0UW2tNxUIfij9zVfRMAGfIFM+ItQeZ5Mt3fA:iMdR2N4VnW2PU9j7KIFjISeZ5MtvA
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-701583114-2636601053-947405450-1000\{0EB59AB5-4185-4001-B254-80F658723784} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2968 wmplayer.exe Token: SeCreatePagefilePrivilege 2968 wmplayer.exe Token: SeShutdownPrivilege 1944 unregmp2.exe Token: SeCreatePagefilePrivilege 1944 unregmp2.exe Token: 33 2412 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2412 AUDIODG.EXE Token: SeShutdownPrivilege 2968 wmplayer.exe Token: SeCreatePagefilePrivilege 2968 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1692 2968 wmplayer.exe 85 PID 2968 wrote to memory of 1692 2968 wmplayer.exe 85 PID 2968 wrote to memory of 1692 2968 wmplayer.exe 85 PID 1692 wrote to memory of 1944 1692 unregmp2.exe 86 PID 1692 wrote to memory of 1944 1692 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\2024-07-25 15-10-28.mkv"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1148
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c0 0x3e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD526e4064ee797380fa9a8cbb624bd73b2
SHA14ec24c0ec5b7f2481a7dafd738b199f687b7c531
SHA25647e13bfa02bc2f2892a1599b36ca95f4172fdf75cf4d0ea58fba8ebc1633c85d
SHA5121631279ab6c3b3409235a8c896bba292255b6b67f62d431af51301572c20484f96b2f357ffc818fa9f2d87f7f5bdb12d692ce561d9f71035e16814d8ea7d1590
-
Filesize
1024KB
MD58b2896117ef716c7e587551756f96cd9
SHA19c060d2085d4f58181d9030a415b29f893f718f1
SHA25672f56fbadbcfd06dc04515d9cfa6acbc47b3bb8bd867b44171bbbe6d22681493
SHA5129d369a45011ae8f2483ff63025e6dbe80d79807cef191b4c4f4820e37a9e435f4e68a3e3019acd8562b0e4ffcc26d2387cf05488e10e7cf2692f109b535a0990
-
Filesize
68KB
MD57cf1cba6cab64517a235b334288bf6d1
SHA17ec37390f6e9b821a4ed8407e65ad829d28068e3
SHA25652b283801cd477f104d72dddd053343c3ab5232a1844c8631438f747ef0ac13f
SHA51234dfe4eea22015bd101b3116673a4c43acb73c846932a3e1b22cda0d07cec1dafe24993a3403982a20aeb800ce583b1f8621494f560383b7bd3aebff91217b0d
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5d88015f8c3eaad42c576d8514a6e9d7a
SHA1f2f50b8ea51b104735b5315f3a9239f46b47affb
SHA25663dfc4de5449abf28ef8d4170eb3b44eba04c5b4c24c016f6390b68684975d8a
SHA5125b0e4a3701d77e281b4938d154cac30eaacd01479f0b54fa34daeb1e126c69acf01ea901158c564b38728ffa9d8ffaf91eceaa412a231c3c82a2c75f7d1fc7c0