Overview
overview
7Static
static
3FLEXER (2).rar
windows7-x64
3FLEXER (2).rar
windows10-2004-x64
3beep.wav
windows7-x64
1beep.wav
windows10-2004-x64
6bin/API.dll
windows7-x64
1bin/API.dll
windows10-2004-x64
1main.exe
windows7-x64
7main.exe
windows10-2004-x64
7success.wav
windows7-x64
1success.wav
windows10-2004-x64
6workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/...et.txt
windows7-x64
1workspace/...et.txt
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/..._1.txt
windows7-x64
1workspace/..._1.txt
windows10-2004-x64
1workspace/..._2.txt
windows7-x64
1workspace/..._2.txt
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/...tefile
windows7-x64
1workspace/...tefile
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
FLEXER (2).rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
FLEXER (2).rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
beep.wav
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
beep.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
bin/API.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
bin/API.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
main.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
main.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
success.wav
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
success.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
workspace/.tests/appendfile.txt
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
workspace/.tests/appendfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
workspace/.tests/getcustomasset.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
workspace/.tests/getcustomasset.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
workspace/.tests/isfile.txt
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
workspace/.tests/isfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
workspace/.tests/listfiles/test_1.txt
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
workspace/.tests/listfiles/test_1.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
workspace/.tests/listfiles/test_2.txt
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
workspace/.tests/listfiles/test_2.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
workspace/.tests/readfile.txt
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
workspace/.tests/readfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
workspace/.tests/writefile
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
workspace/.tests/writefile
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
workspace/.tests/writefile.txt
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
workspace/.tests/writefile.txt
Resource
win10v2004-20240802-en
General
-
Target
beep.wav
-
Size
96KB
-
MD5
9557be8f4c0cef2ee6d14652ed46bef2
-
SHA1
55038245a9f8c01b50e4983d59c5d4b199412b42
-
SHA256
71406a214249d59035d58bb7f9f2ed203317a107653d08ff6f3cc54666e793fb
-
SHA512
05fe0eb1be1dc042f2dcba8c199ce4bbd15c64aaa3f30c1b3efee4f206e5eb63182629cc808a4bf8072c18c1ec36c51588a801aa061ee4dd8e75ac2e7ccf7e21
-
SSDEEP
768:mkkL+Dj3PVRRRAiIRJY4ayRviX247XA3IFd5Q2o11qdfd11X7E5v6+B+:mj+Dj3PzpI/tpR6zD/d59ovS11rki+A
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{B0FA008F-9CF1-4AF1-9FF4-AAD93B6EB867} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2212 wmplayer.exe Token: SeCreatePagefilePrivilege 2212 wmplayer.exe Token: SeShutdownPrivilege 1528 unregmp2.exe Token: SeCreatePagefilePrivilege 1528 unregmp2.exe Token: 33 4748 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4748 AUDIODG.EXE Token: SeShutdownPrivilege 2212 wmplayer.exe Token: SeCreatePagefilePrivilege 2212 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2212 wrote to memory of 4428 2212 wmplayer.exe 87 PID 2212 wrote to memory of 4428 2212 wmplayer.exe 87 PID 2212 wrote to memory of 4428 2212 wmplayer.exe 87 PID 4428 wrote to memory of 1528 4428 unregmp2.exe 89 PID 4428 wrote to memory of 1528 4428 unregmp2.exe 89
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\beep.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x3801⤵
- Suspicious use of AdjustPrivilegeToken
PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD5ff2b393f588e246897e72ff1c4dbf41d
SHA16f301d20417fac3be98c22afc946709827205a9d
SHA2564a902f68c85d4c3d51ee8a4d14a419bb7bd51c722069b64942d38f42bf1711e8
SHA512543dad74d5644da9d3edc752bbdc9268a18dc6e9bcb1d004dd0bda4148cbbbd48bdd7cf232d6c91270b6e5599101a18c45623884a42e36159b0f511c3239c5c9
-
Filesize
68KB
MD5d9eab54b0259cbb451c029e9da1f739a
SHA1a3d67640c035375693ceb293b5cfea5faf056163
SHA2562dee81cded28efd68016a6cac1898021bf4d02123af5297b4e6acb090658e9b5
SHA512c1c51df63322a1a5ae243d6415e2a42acd97c47d43c1579fe1422ba7246e30d4dd850c0c0e3a669c1bfddd0ea82918cf9a59bfdd8010378223ccc74569250360
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5f1a4c5938aa073036ce00678218c64ab
SHA1b272947e0664525664d40d14310f22e84287d5f0
SHA256067511032cf70be5cd66500bf97e3be8474992808555bce8f2656935f399ec5d
SHA512e3b10f0ba25b863651664e6fe7b37d537fa6997aae1a7d7590e7f668dca6e4d8da07bc8d7a271f41c1a85635ecf0b0b4c7832e5c497510eb9756c89d810fa1fa