Analysis
-
max time kernel
26s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
Kou! - Frost Walker (mp3cut.net).mp3
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Kou! - Frost Walker (mp3cut.net).mp3
Resource
win10v2004-20240709-en
Errors
General
-
Target
Kou! - Frost Walker (mp3cut.net).mp3
-
Size
9.5MB
-
MD5
61b530ab6768496d12567a83371d4bc9
-
SHA1
67fc23489febeae81c107ac9f0394325c6344f25
-
SHA256
8f22eae7b9068875610532d18200a7e5ec443092db9a1f8a1739708847b861e9
-
SHA512
216649cc4b1b1923a3f71a20dc7f8c74a56a74a29b4817ef336a6d9ce45d8d4d1742fda0b783a3f995513c7d71e34f78d610775fe0a68e93a4ee8105d1b8dba9
-
SSDEEP
196608:lEOkp6EHbkaoGtUOdjSgtUyz6oz5N3sU5cXKYmX3EITMM:RU1HoRmUQmToz5taXj63E/M
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpshare.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2164 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2164 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2164 vlc.exe Token: SeIncBasePriorityPrivilege 2164 vlc.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2780 wmplayer.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe 2164 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2164 vlc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2732 2780 wmplayer.exe 31 PID 2780 wrote to memory of 2732 2780 wmplayer.exe 31 PID 2780 wrote to memory of 2732 2780 wmplayer.exe 31 PID 2780 wrote to memory of 2732 2780 wmplayer.exe 31
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Kou! - Frost Walker (mp3cut.net).mp3"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2164
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Windows Media Player\wmpshare.exe"C:\Program Files (x86)\Windows Media Player\wmpshare.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:768
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms~RFf77a4b8.TMP
Filesize1KB
MD52bd85a6085b229eb53355dea32068db2
SHA18946e368601afc41995a91f229804391a2e35a5a
SHA256fb64b085c57cd957a470b0b6038d1bda49c5c92ad962b2dd06797660d9ee942a
SHA512539bff4b7b86008c18aee41b48b6127c33770c3f00d704490d20f65b2bafdfd6b1327591d2d5f5f5d17606ce2b083dbcec57babc8a27649b6a3823268a1214d0