Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 14:11

General

  • Target

    945809687-1-16.mp4

  • Size

    4.2MB

  • MD5

    82c0e805ca67ff90d24a6f3d9f8af149

  • SHA1

    11270cd32566f5ed30fe775edc0577d83d682896

  • SHA256

    d6eef9e1278cc3893b7a1729d35c7f5b8df95a8b6d322db37e939c17ed11e40e

  • SHA512

    1d8606de97236dbfff579c22395cc1791cc0ce9b85b81f794b4695c0c2a8c11a95ca73032976f0a204de5bb7837f89fedaf5158f22bf14d19a3a435d28cbf6a9

  • SSDEEP

    98304:+5FFW1ufVD6JmXJCaVxGYR74haUTcSaYpcaqM9W9:+5iUVDrXU4oYtMRcSuQ9K

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\945809687-1-16.mp4"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:264
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:708
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x460 0x3cc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    576KB

    MD5

    ed6403a9e04010f1dec738de07aa712e

    SHA1

    1c106b90e799899f7b7d87430272720f05a47b2f

    SHA256

    65ac91d9fa770fe2025fa0866dcdbad3a33087f3aa7974150ad0d6d0c2b87432

    SHA512

    1ac9e6c73f062b10b5af5abf4131827ef347ecaf2295168d2f0ff92a03513a97634a2dcc0dbad40cd4427446fc76673749bbea4988eade919608d174117654b4

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    4a27a6230498e812df7b0bcc03c38b53

    SHA1

    9253124243040edc11f7b243b545de12436a078e

    SHA256

    b773cb103faf71043e456f12e7558f77ceaeac4f9c43049ea31f6fbc40989d36

    SHA512

    83123460c51ae2a5739d9223aca5745a643fd9ffd354653eb7c6b8e80d92f28c724bdec856ff994d1a7e7f2a2f987f5a8e177f0564d89bfe05ce7f5158adcecf

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    5416e83bfe57b631b8f0cf75aa40b80c

    SHA1

    8014cbc668e4e6a7b3eeb69c7cd3c57c4f5fd373

    SHA256

    256503cdffb54146144e8620797c418b9ceea3b73a5a1b0cab091d0817d886d5

    SHA512

    3b5c586881423e80a823bcff3581177acbf91ebdbd2092407c3cf42ef03b130ed09f2d1a219d270c0b2cca9b8301435cdc2fb3de4ee48e2413a3a32841bd58d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    dfc000182623b6cc8c121b8897174093

    SHA1

    62c552860f614b9e0ccd7feb1a38b36591984f17

    SHA256

    a713aac66a710bd790de9cb548782e8096c08a989baa1c00fb6acee86d57fbe5

    SHA512

    400ce8734db3c745531f01ede1ccb4aaf64feb92a0117a006899c823ed9705cbf676d6ed0e00c0d706272a1c55432e6417880e535bc36cf66680927e7afe1217

  • memory/3836-29-0x0000000004480000-0x0000000004490000-memory.dmp

    Filesize

    64KB

  • memory/3836-30-0x0000000004480000-0x0000000004490000-memory.dmp

    Filesize

    64KB

  • memory/3836-32-0x0000000004480000-0x0000000004490000-memory.dmp

    Filesize

    64KB

  • memory/3836-31-0x0000000004480000-0x0000000004490000-memory.dmp

    Filesize

    64KB

  • memory/3836-35-0x0000000006F00000-0x0000000006F10000-memory.dmp

    Filesize

    64KB

  • memory/3836-36-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-37-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-39-0x0000000004480000-0x0000000004490000-memory.dmp

    Filesize

    64KB

  • memory/3836-38-0x0000000004480000-0x0000000004490000-memory.dmp

    Filesize

    64KB

  • memory/3836-40-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-46-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/3836-50-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-52-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-53-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-54-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-55-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-56-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-58-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-57-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-59-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-62-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-61-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-66-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-67-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-68-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-71-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-70-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-69-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-73-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-74-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-75-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-76-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-78-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-79-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-81-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/3836-80-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-82-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-83-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-84-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-85-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-87-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-89-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-90-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-92-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-91-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-88-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-86-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-93-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-95-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-96-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-98-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-97-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-94-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-99-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-100-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-101-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-102-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-103-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-105-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-104-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB

  • memory/3836-106-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/3836-107-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-108-0x0000000004460000-0x0000000004470000-memory.dmp

    Filesize

    64KB

  • memory/3836-109-0x0000000006F10000-0x0000000006F20000-memory.dmp

    Filesize

    64KB