Overview
overview
6Static
static
1sfjmrk.zip
windows11-21h2-x64
1945554145-1-16.mp4
windows11-21h2-x64
6945569409-1-16.mp4
windows11-21h2-x64
6945793906-1-16.mp4
windows11-21h2-x64
6945809687-1-16.mp4
windows11-21h2-x64
6963821516-1-16.mp4
windows11-21h2-x64
6964296702-1-16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6Analysis
-
max time kernel
271s -
max time network
259s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/08/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
sfjmrk.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
945554145-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
945569409-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
945793906-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
945809687-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
963821516-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
964296702-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
__MACOSX/._945554145-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
__MACOSX/._945569409-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
__MACOSX/._945793906-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
__MACOSX/._945809687-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
__MACOSX/._963821516-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
__MACOSX/._964296702-1-16.mp4
Resource
win11-20240802-en
General
-
Target
945809687-1-16.mp4
-
Size
4.2MB
-
MD5
82c0e805ca67ff90d24a6f3d9f8af149
-
SHA1
11270cd32566f5ed30fe775edc0577d83d682896
-
SHA256
d6eef9e1278cc3893b7a1729d35c7f5b8df95a8b6d322db37e939c17ed11e40e
-
SHA512
1d8606de97236dbfff579c22395cc1791cc0ce9b85b81f794b4695c0c2a8c11a95ca73032976f0a204de5bb7837f89fedaf5158f22bf14d19a3a435d28cbf6a9
-
SSDEEP
98304:+5FFW1ufVD6JmXJCaVxGYR74haUTcSaYpcaqM9W9:+5iUVDrXU4oYtMRcSuQ9K
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-661032028-162657920-1226909816-1000\{292AB79A-E639-4773-801F-8AB44ABD64E0} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1216 wmplayer.exe Token: SeCreatePagefilePrivilege 1216 wmplayer.exe Token: SeShutdownPrivilege 420 unregmp2.exe Token: SeCreatePagefilePrivilege 420 unregmp2.exe Token: 33 5108 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5108 AUDIODG.EXE Token: SeShutdownPrivilege 1216 wmplayer.exe Token: SeCreatePagefilePrivilege 1216 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1216 wrote to memory of 4728 1216 wmplayer.exe 82 PID 1216 wrote to memory of 4728 1216 wmplayer.exe 82 PID 1216 wrote to memory of 4728 1216 wmplayer.exe 82 PID 4728 wrote to memory of 420 4728 unregmp2.exe 83 PID 4728 wrote to memory of 420 4728 unregmp2.exe 83
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\945809687-1-16.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1076
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004901⤵
- Suspicious use of AdjustPrivilegeToken
PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5470e2894e5476066a3a5dfc6487bc629
SHA173aebfa51a6dca2a168d8ca7c3eed2e326f36d77
SHA256f876216800b721ab4300bd56de23e2d068188fa2b2e57c93b5d1d62c7f2719a5
SHA512953d31eece8aa5ac3f956872282224a487bd98145f7297b94a7702c1b83281e533f884bcbdb49cce4127cab6aa2d16c95fb0e1cf0f262080ed1b5421c1974c1e
-
Filesize
1024KB
MD5e51b5de343f124e16fed2b0aef3c1acc
SHA1f8c66cec11f8f8df0a6b4facf7f5ea6019b8f409
SHA256490caa5078754134e202072f97fa0b3d655b790b4d44d6b693df113af924d64e
SHA51218e90e2ec69599c00e531d598b8620931f278115f5e9b3fb37da41dca1369fd528da28c28eba09a5b1db2f51bfd6e809226688b99c788b097e8e2a5f3eda8fab
-
Filesize
68KB
MD510b79eaf4cb2f260b0943bb9791fdd75
SHA1ddfb095ce41ecfb1fa4e415effbf18e4f989a751
SHA256f9dbd729a291723529ff74881d02619e539a440f70b84f90fb48be8179a5fad2
SHA5123ce6f80f927cd5bc3ce6bb78cfc8bf3c1bd2915af4ac0b9b6809395b109f50b14f99e0ea31a53f1ca25dfa7f84d094971aa835d70a6f3ebe331780af63a06301
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD54b998799bf111b00820c3bf007f4466f
SHA1ab65f60487408cb83ae5c2029daabb00438fcbee
SHA256e38ad094cbbbe9e94d78fae6f25d842f9dd5eb200520164391675694c3dd537b
SHA512c3033a2e2fc8995f0b3b96e15111100c173e9aa9f9ba081147d70ca576786f333037737058d0f51808fb49e3817ccdd1de8c5c3b7ee119803fbbda8e62296a2f