Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 12:35

General

  • Target

    beep.wav

  • Size

    96KB

  • MD5

    9557be8f4c0cef2ee6d14652ed46bef2

  • SHA1

    55038245a9f8c01b50e4983d59c5d4b199412b42

  • SHA256

    71406a214249d59035d58bb7f9f2ed203317a107653d08ff6f3cc54666e793fb

  • SHA512

    05fe0eb1be1dc042f2dcba8c199ce4bbd15c64aaa3f30c1b3efee4f206e5eb63182629cc808a4bf8072c18c1ec36c51588a801aa061ee4dd8e75ac2e7ccf7e21

  • SSDEEP

    768:mkkL+Dj3PVRRRAiIRJY4ayRviX247XA3IFd5Q2o11qdfd11X7E5v6+B+:mj+Dj3PzpI/tpR6zD/d59ovS11rki+A

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\beep.wav"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1528
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:1860
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x510 0x380
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    64KB

    MD5

    987a07b978cfe12e4ce45e513ef86619

    SHA1

    22eec9a9b2e83ad33bedc59e3205f86590b7d40c

    SHA256

    f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8

    SHA512

    39b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    ff2b393f588e246897e72ff1c4dbf41d

    SHA1

    6f301d20417fac3be98c22afc946709827205a9d

    SHA256

    4a902f68c85d4c3d51ee8a4d14a419bb7bd51c722069b64942d38f42bf1711e8

    SHA512

    543dad74d5644da9d3edc752bbdc9268a18dc6e9bcb1d004dd0bda4148cbbbd48bdd7cf232d6c91270b6e5599101a18c45623884a42e36159b0f511c3239c5c9

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    d9eab54b0259cbb451c029e9da1f739a

    SHA1

    a3d67640c035375693ceb293b5cfea5faf056163

    SHA256

    2dee81cded28efd68016a6cac1898021bf4d02123af5297b4e6acb090658e9b5

    SHA512

    c1c51df63322a1a5ae243d6415e2a42acd97c47d43c1579fe1422ba7246e30d4dd850c0c0e3a669c1bfddd0ea82918cf9a59bfdd8010378223ccc74569250360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    f1a4c5938aa073036ce00678218c64ab

    SHA1

    b272947e0664525664d40d14310f22e84287d5f0

    SHA256

    067511032cf70be5cd66500bf97e3be8474992808555bce8f2656935f399ec5d

    SHA512

    e3b10f0ba25b863651664e6fe7b37d537fa6997aae1a7d7590e7f668dca6e4d8da07bc8d7a271f41c1a85635ecf0b0b4c7832e5c497510eb9756c89d810fa1fa

  • memory/2212-32-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2212-33-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2212-31-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2212-34-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2212-36-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2212-35-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB