Overview
overview
10Static
static
1₳DÐ✵S...xe.xml
windows7-x64
3₳DÐ✵S...xe.xml
windows10-2004-x64
1₳DÐ✵S...64.dll
windows7-x64
1₳DÐ✵S...64.dll
windows10-2004-x64
1₳DÐ✵S...up.exe
windows7-x64
1₳DÐ✵S...up.exe
windows10-2004-x64
10₳DÐ✵S...ig.exe
windows7-x64
1₳DÐ✵S...ig.exe
windows10-2004-x64
3₳DÐ✵S...or.mkv
windows7-x64
1₳DÐ✵S...or.mkv
windows10-2004-x64
6₳DÐ✵S...up.rar
windows7-x64
3₳DÐ✵S...up.rar
windows10-2004-x64
3₳DÐ✵S...iz.exe
windows7-x64
3₳DÐ✵S...iz.exe
windows10-2004-x64
3₳DÐ✵S...es.ini
windows7-x64
1₳DÐ✵S...es.ini
windows10-2004-x64
1₳DÐ✵S...64.dll
windows7-x64
1₳DÐ✵S...64.dll
windows10-2004-x64
1₳DÐ✵S...ts.dll
windows7-x64
1₳DÐ✵S...ts.dll
windows10-2004-x64
1₳DÐ✵S...-1.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1₳DÐ✵S...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
₳DÐ✵SetUp✓/ObjectDock.exe.xml
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
₳DÐ✵SetUp✓/ObjectDock.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
₳DÐ✵SetUp✓/SdAppServices_x64.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
₳DÐ✵SetUp✓/SdAppServices_x64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
₳DÐ✵SetUp✓/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
₳DÐ✵SetUp✓/Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
₳DÐ✵SetUp✓/config.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
₳DÐ✵SetUp✓/config.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
₳DÐ✵SetUp✓/expostulator.mkv
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
₳DÐ✵SetUp✓/expostulator.mkv
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
₳DÐ✵SetUp✓/grownup.rar
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
₳DÐ✵SetUp✓/grownup.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
₳DÐ✵SetUp✓/updater/NvStWiz.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
₳DÐ✵SetUp✓/updater/NvStWiz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
₳DÐ✵SetUp✓/updater/manager/ks_tyres.ini
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
₳DÐ✵SetUp✓/updater/manager/ks_tyres.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
₳DÐ✵SetUp✓/x64/trading_api64.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
₳DÐ✵SetUp✓/x64/trading_api64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
₳DÐ✵SetUp✓/x64/tradingnetworkingsockets.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
₳DÐ✵SetUp✓/x64/tradingnetworkingsockets.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-rtlsupport-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-string-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-synch-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-synch-l1-2-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-sysinfo-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-timezone-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-core-util-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-crt-conio-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
₳DÐ✵SetUp✓/x86/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240802-en
General
-
Target
₳DÐ✵SetUp✓/expostulator.mkv
-
Size
931KB
-
MD5
4d4f8fd4efc85fed159682182b6965c3
-
SHA1
f7e6488f23f24cf964f06ad75988e91cece1fcf9
-
SHA256
981f51982d1c6b4da35230801dac2ea3cb8be4032b113e8d81f7c62d85e13d2e
-
SHA512
d8a48bf52d49e64a837f43a96359860d2cd24effa775054882982bc794ff0d3460f79d79a61ed1b92c6965c77f42b6acf713cbabc9d18ea6a035e73aa83e5ed9
-
SSDEEP
24576:At+XAh4OLfmC/cuFZX6www7Zc1JihpDPMzcGFujg:AGAmIfmC0aZieZcWvLMzc8T
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3680 unregmp2.exe Token: SeCreatePagefilePrivilege 3680 unregmp2.exe Token: SeShutdownPrivilege 3000 wmplayer.exe Token: SeCreatePagefilePrivilege 3000 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3000 wrote to memory of 4200 3000 wmplayer.exe 86 PID 3000 wrote to memory of 4200 3000 wmplayer.exe 86 PID 3000 wrote to memory of 4200 3000 wmplayer.exe 86 PID 4200 wrote to memory of 3680 4200 unregmp2.exe 87 PID 4200 wrote to memory of 3680 4200 unregmp2.exe 87
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\₳DÐ✵SetUp✓\expostulator.mkv"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD55ea0f495e38bc9865431e664269f455f
SHA19d0eaad7090ba36be6606ecb91904fe4739c5450
SHA25652bf6231c50c7dcea429236b557920869c898e2bb4b08658a35c1c5b08e4bb24
SHA5124b8c9769712e0417722e12802247733a9ef32a4c330c03f879887cc6ac41025a48b3441278c28c72e8acc62d70bcf21841b732382e5fbf26fd8c5e466f5fe943
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD53ad2eb631e73e2a4221f6b44bcdf2f31
SHA15fd093f038901b03c57825bda55993043f0fa410
SHA25658a580e12f1b1d68415b513294fcba82702fe5dead89c388b26e48bae06bf8a4
SHA512e93d53491a69d634ab2a79c19afc3880b2c0429505216fb80ea00f0b93ac4a13c2a5a05c2fc72a5c1d57dc83dc24db38df9cc7fd0a7c78fb298eb94a860a052a