Overview
overview
6Static
static
1sfjmrk.zip
windows11-21h2-x64
1945554145-1-16.mp4
windows11-21h2-x64
6945569409-1-16.mp4
windows11-21h2-x64
6945793906-1-16.mp4
windows11-21h2-x64
6945809687-1-16.mp4
windows11-21h2-x64
6963821516-1-16.mp4
windows11-21h2-x64
6964296702-1-16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6__MACOSX/....16.mp4
windows11-21h2-x64
6Analysis
-
max time kernel
90s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/08/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
sfjmrk.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
945554145-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
945569409-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
945793906-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
945809687-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
963821516-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
964296702-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
__MACOSX/._945554145-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
__MACOSX/._945569409-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
__MACOSX/._945793906-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
__MACOSX/._945809687-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
__MACOSX/._963821516-1-16.mp4
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
__MACOSX/._964296702-1-16.mp4
Resource
win11-20240802-en
General
-
Target
__MACOSX/._945554145-1-16.mp4
-
Size
1KB
-
MD5
0687181cbf1a829295d335481bca0932
-
SHA1
26664e7d8de97f78c8e04379ea96499e3c193c13
-
SHA256
6134a5736cada8eda59863d49bed0524000953ac678be078360e1a091cf945f7
-
SHA512
ed3c4c72c78c6d1089955ecce3b2761a505b095b55758e7f258db88143a8eaac6e3408166d17134e8d939b24b2a260c1ff1c525880e31db7ee7520c97ddb99f9
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1372 wmplayer.exe Token: SeCreatePagefilePrivilege 1372 wmplayer.exe Token: SeShutdownPrivilege 5008 unregmp2.exe Token: SeCreatePagefilePrivilege 5008 unregmp2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1372 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2600 1372 wmplayer.exe 82 PID 1372 wrote to memory of 2600 1372 wmplayer.exe 82 PID 1372 wrote to memory of 2600 1372 wmplayer.exe 82 PID 2600 wrote to memory of 5008 2600 unregmp2.exe 83 PID 2600 wrote to memory of 5008 2600 unregmp2.exe 83
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\__MACOSX\._945554145-1-16.mp4"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5c202cc88d1fee378c518328edf991df5
SHA129ab9af4122a6b51b1a3ea59dc4240a95699190d
SHA2567bd256f18d607f7c307532369d312c40c2287ec6e57613863a4543c6611611a4
SHA5124b3316f8774b4a6235236cad3ff4b8112825e0d85c6efb383f01ffbf0d5b81a6658579a4c9d494da5e54cad1f404aeaf453a04e1694c1af4efe1646fa7498aa0
-
Filesize
1024KB
MD56c98a171af17dde0a4f24c5914fd653c
SHA119d5c22732f91c4d30c6e25c0150c42a55bb81f6
SHA2566fcc761f9f285bd8a283d09a16e6497993225020475931bee936b98d33ce55e7
SHA5128a76a8d96bad6ddb29caa7b4916eb5b6822030e5447f94c83225359fe51341d22d8a1484e9e23ae90d194669a460b45822a08b5be46ac28fa4a3b37b48f5cc43
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD51f2faff482295f47ee9a623c78f072d9
SHA15263bcb58f7fcf5c42240cf10d346a66242ffb72
SHA256421e42bc87c0440710aa52fa39addc1cc26cc3f54e2be144bd8b672fb5b96329
SHA5125ea26d27bf48f5569ef4ae0d7c9542ab2dbb88f6e311f2c7be3426b51d5e76893691fd1045cd439abadecbad161c2580fbc7ef3097e899d7489075f36341b486