Overview
overview
6Static
static
1945554145-1-16.mp4
windows7-x64
1945554145-1-16.mp4
windows10-2004-x64
6945569409-1-16.mp4
windows7-x64
1945569409-1-16.mp4
windows10-2004-x64
6945793906-1-16.mp4
windows7-x64
1945793906-1-16.mp4
windows10-2004-x64
6945809687-1-16.mp4
windows7-x64
1945809687-1-16.mp4
windows10-2004-x64
6963821516-1-16.mp4
windows7-x64
1963821516-1-16.mp4
windows10-2004-x64
6964296702-1-16.mp4
windows7-x64
1964296702-1-16.mp4
windows10-2004-x64
6Analysis
-
max time kernel
20s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
945554145-1-16.mp4
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
945554145-1-16.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
945569409-1-16.mp4
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
945569409-1-16.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
945793906-1-16.mp4
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
945793906-1-16.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
945809687-1-16.mp4
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
945809687-1-16.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
963821516-1-16.mp4
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
963821516-1-16.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
964296702-1-16.mp4
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
964296702-1-16.mp4
Resource
win10v2004-20240802-en
General
-
Target
964296702-1-16.mp4
-
Size
6.0MB
-
MD5
1f6f9f5eb918fa962287f32e92ecebaf
-
SHA1
8822c8642d458ed119f94651945bfa66210cda18
-
SHA256
b1b88e0ef12b8e773ae69045fecc0e38c9f886ef3c9658f6b6c3a9046c04d8d8
-
SHA512
10a65cc980b5c1b1f890a4c12a65061b656cc48c3c28cc9bc0c1947edc98b29872438ca738855d8931141685ef95a190ae64e9a9bc6cc1f00e3432febf480c70
-
SSDEEP
98304:plAog9kGBs7smQFD9sqWxILnjZH/hcQF/WakD/QghzIVjW3LFNCOTVrTdmldZrqr:3JgfXrFCqQQnFWQFluIKNCePEzkaV+
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{C8B72675-CC5F-4C86-9164-3A92AEE546A6} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1004 wmplayer.exe Token: SeCreatePagefilePrivilege 1004 wmplayer.exe Token: SeShutdownPrivilege 2968 unregmp2.exe Token: SeCreatePagefilePrivilege 2968 unregmp2.exe Token: 33 2236 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2236 AUDIODG.EXE Token: SeShutdownPrivilege 1004 wmplayer.exe Token: SeCreatePagefilePrivilege 1004 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1004 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1004 wrote to memory of 2676 1004 wmplayer.exe 92 PID 1004 wrote to memory of 2676 1004 wmplayer.exe 92 PID 1004 wrote to memory of 2676 1004 wmplayer.exe 92 PID 2676 wrote to memory of 2968 2676 unregmp2.exe 93 PID 2676 wrote to memory of 2968 2676 unregmp2.exe 93
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\964296702-1-16.mp4"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2044
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x3041⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4328 /prefetch:81⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5adbd8353954edbe5e0620c5bdcad4363
SHA1aeb5c03e8c1b8bc5d55683ea113e6ce1be7ac6e6
SHA25664eff10c4e866930d32d4d82cc88ec0e6f851ac49164122cae1b27eb3c9d9d55
SHA51287bf4a2dc4dd5c833d96f3f5cb0b607796414ffee36d5c167a75644bcbb02ab5159aa4aa093ed43abe290481abc01944885c68b1755d9b2c4c583fcccd041fd2
-
Filesize
1024KB
MD5e60c2bf59ea04946d73db447ca7bed00
SHA1511f248a3484d3958495688079cd9193a6adf1a0
SHA25619d5f1c2bc98269caf4a754d9fd49569453fb08b0b14e20b4c72de09f36a56d9
SHA5122200809f46dfb1f4a8056d6171daece3ae000cf9a616964567118b5f6ae3203b4bf1e70b8af8b093dc51becb75796ce3bc7792aca8bb47855ddab561e8dbbe7e
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD503933524adab9b0c037073b5706147ff
SHA171a5a1e6e6b5c034372ab67490ada5940aa7ef64
SHA256b3d0c769ac2e9083453b10766b3394c0216ea49a9e298283e72abf914d8e5cfb
SHA5128d26ecf48928ab05c3b6df932b49e4c40a8fcb8eff69576fc571d0bb2e663fa2702db8bf0ee4b3b62703ce1b361a05d27546864b09a4f867b5ad31e750bd0bad