Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
240724-1ra61sygrm_pw_infected.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
robloxapp-20240723-2013413 (1).mp4
Resource
win10v2004-20240802-en
General
-
Target
robloxapp-20240723-2013413 (1).mp4
-
Size
4.0MB
-
MD5
74efca33557647c70ef6541d0026ca31
-
SHA1
eb572f56717691c539da2b528867edd739809ec1
-
SHA256
db805be2b058db79f7c47c6f0e50c14ed9e1faa63b9c274846d55a11c67137f8
-
SHA512
5ac9b31acf1a7afe6689e903907d3f203aecef181eb592aa8293b34c52bb174c9edc9f9930e988161dbaf5aa8f522c870ac2f0a99ebd19f2a30161824cf3989c
-
SSDEEP
49152:kCXKuvdLfw2XeXwAW2iqNv6cN0SVgaTTducys52Rf50qx/RKGjwYcqpPHely1BRo:N/1LI2NRwv6KVgaVIh31QGVtrbd7K
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{E391C331-60DE-4701-B649-6AE6AFEC7EA9} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2304 unregmp2.exe Token: SeCreatePagefilePrivilege 2304 unregmp2.exe Token: SeShutdownPrivilege 4820 wmplayer.exe Token: SeCreatePagefilePrivilege 4820 wmplayer.exe Token: 33 1060 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1060 AUDIODG.EXE Token: SeShutdownPrivilege 4820 wmplayer.exe Token: SeCreatePagefilePrivilege 4820 wmplayer.exe Token: SeShutdownPrivilege 4820 wmplayer.exe Token: SeCreatePagefilePrivilege 4820 wmplayer.exe Token: SeShutdownPrivilege 4820 wmplayer.exe Token: SeCreatePagefilePrivilege 4820 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4820 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2928 4820 wmplayer.exe 85 PID 4820 wrote to memory of 2928 4820 wmplayer.exe 85 PID 4820 wrote to memory of 2928 4820 wmplayer.exe 85 PID 2928 wrote to memory of 2304 2928 unregmp2.exe 86 PID 2928 wrote to memory of 2304 2928 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\robloxapp-20240723-2013413 (1).mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:5040
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD551017a02b8d1c3a4c968c356f81f01cb
SHA1974802a8b2bdf31192aefb2f14ec1a466d0ec96f
SHA256aff99e1aaae2db83050f4199b0a0fbfa2a9cae1f385b1c9542b4ffbf7ebd2914
SHA512eb186169a7a746f65ecb65a22eda820ec3df38a900a7e10a53854df0dff5e26cd51d65c6ddce3a1a936f92f92f5d29c14c755c2d6bf756b35ecd952bcf57349c
-
Filesize
68KB
MD50fa90188e9504a4d54c296f4e10870f2
SHA1249f61e2a8e85e9b2eb786438dc969740a1d6dd4
SHA256ae72487a95e3e4a551e87c25e00e727c8128496035aefab3ea50b7752cd961a1
SHA51241a13bcaa210213383be85602d19f7f873f30423e41b1f59058038506f8e3b7bb195a83412bed4691743116be412138a192b2777bcc695e46231685daad9ad20
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD58ce9da2a15b61d518c30be3ae65557bc
SHA1e08045674128a7026c6dae1ba292aa80db0890b4
SHA256fc07be0fab973b4c27a94002e9cf4dbca8163474b16cefe4ac77c41a994380b1
SHA512c6345d365777ac7e8473f8351846817be41eefc30b799372a21924583761f288ee99ce99e23882c1ef87fe09525102a5d83e75eb615a18b441d17ecdf80aa694