Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-08-2024 22:48
Static task
static1
Behavioral task
behavioral1
Sample
8mb.video-YV5-ugQKomqh.mp4
Resource
win11-20240802-en
General
-
Target
8mb.video-YV5-ugQKomqh.mp4
-
Size
5.7MB
-
MD5
645c6657d4a7077032fab296d06e7312
-
SHA1
2a59f20ccce669cd06bb4399e6d1c2a79abb12d8
-
SHA256
e15b8577855715dd85a44839e0c6773eda47e3379cd03130a4d3b85668da4175
-
SHA512
ad1b80d3454a9e5249f550a5c1ae3ca1aa4f5cb71055583ced705d3f812e37fdee9db1c5835e99d5485e9c8f6b5faebb0598469214586af288a800f2576ca8a3
-
SSDEEP
98304:qFOpDP8/pyqmbGtsII59yWaw7pEQfHHTu5KKqcQtZi4DNroxflUn4wX3n4Uz8:ZiaGhy8Wp79/HTu5KxXhroY/34Uz8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5024 1868 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4272559161-3282441186-401869126-1000\{21DEDF6E-A3F0-47C5-B018-4F389AE2236A} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1868 wmplayer.exe Token: SeCreatePagefilePrivilege 1868 wmplayer.exe Token: SeShutdownPrivilege 4216 unregmp2.exe Token: SeCreatePagefilePrivilege 4216 unregmp2.exe Token: 33 3192 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3192 AUDIODG.EXE Token: SeShutdownPrivilege 1868 wmplayer.exe Token: SeCreatePagefilePrivilege 1868 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 wmplayer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1548 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1868 wrote to memory of 656 1868 wmplayer.exe 80 PID 1868 wrote to memory of 656 1868 wmplayer.exe 80 PID 1868 wrote to memory of 656 1868 wmplayer.exe 80 PID 656 wrote to memory of 4216 656 unregmp2.exe 81 PID 656 wrote to memory of 4216 656 unregmp2.exe 81
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\8mb.video-YV5-ugQKomqh.mp4"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 12042⤵
- Program crash
PID:5024
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4744
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004E41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1868 -ip 18681⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5bbb416e94d91b0dfbb49e250efb4e183
SHA1bbf9700fd646ed2de62e7efc230b578e7cb5d414
SHA25682302657180df4c8f2f81df34d3150f263b1a51773fc168b0b639906163d0dd5
SHA51213d07ae391a9429f508a052aa7c6fa39fdc1d18963e2697f7918229dbebcaf937c65fa4209099178a9ca66e8ccb48544f24a073ca24837e65983f1517b054d3f
-
Filesize
1024KB
MD52288e7b70300c4b610b1dcff2a2e1e49
SHA10d5ee31f21a8c46aac6c4dd357c2400971aa7acb
SHA256dfb91b178b14c5a3bcae0f7ef74a2533e6e071af795a5d14073dee392c6ede94
SHA512948cd3c8ed97fbb63113f9f34dbd8f3680364f6e6e6149efaae4d346104eddf972ddca88c4e8b9d333143c942b758ef960fcc062ece0bd4ca8f51fa8e6e125cb
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD506f54da138064bcb87a50ea5796be0bc
SHA1149614dcc0cc8a15d12e042639d53d364b692f5a
SHA256fd00cc98658581a6d166ce94e14f68079c4a2948db69e5ac60755ac8c50c1f50
SHA512530073a003f19a93945cc2d663cd395744c98b3d8377ed6fbc237be0b42b7ec23544fe149435e3d5d47b8d385c2a9bd1e2605222bbe2df0d3233edf10550202d
-
Filesize
1KB
MD5891734a8f68d80ac20c95bf92f97c9ad
SHA147308d2da31a74a17ae9b96675312b90bcdf17c5
SHA256c09c76c2e76e5e2aabb0432a05b77cb385b5093ff3cb9bea6d1ad7c4ab914a13
SHA512f0886d03ce78b82fbf4bcee8d3ba46efe72665bb78554507d66246580ee2b2611b2c8a2d52cf3f43f6b638200d796e90d49c8c2b2b75294dffac8dc870674fba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD575fca6ad65af471403460d73352b2eed
SHA181c8fe23b3c9a777cdec6d0ef19d4ac1b3aead6b
SHA25668f99e5abf44c3db01f30fdb26f13bc7b0838c3656cf3072cf0adeb98d5c964e
SHA512bce242f5bc43727f5b5e9930c269d161184afbbbc14c22ee572e28022102ce47ac74b8135fa5bd7f33dd53455ade602ce9221b606b78b5d16b01ca9bf0947017
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5f8b38f01e951e3045f8cf12b3c7d65d7
SHA109eb81bd1de275cc43726287878c892e393b75f7
SHA256738fa8995646a10a9117756f17fdd651df1dfc2cf74bb48c70998e835d778777
SHA5129dbcd27b8d17b9c78cda40434603944ac9d27824e8352ca67b899ffd916c1fae97382a3a5d1f79cbdf14377e92cc08f2b9adbdaf2bcac32ca38024259b129a95