Analysis
-
max time kernel
196s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16/08/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
Estonia3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Estonia3.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Estonia3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Estonia3.exe
Resource
win11-20240802-en
General
-
Target
Estonia3.exe
-
Size
94KB
-
MD5
cda4e955c9ed698a1df4ce736eb39d76
-
SHA1
e8dacd52cb34c3d34bfe4a117511ce3991b2ae94
-
SHA256
2812bff1ead67a077addcb6191a223fb213d4382610ba78c30bd410190195dc5
-
SHA512
1a191d842b90afa223087dd71bed309a81f62405ac704e0c7d25879723723f67dcde88ffa70619eecc3b9e729df3d6e79476674d3f1c51f02739913486fd38a2
-
SSDEEP
1536:2BDgolBDgoI7ZD2wNbdV+3h3t8OUEH23LiorMb6T9EDpVUjCQan38d8vRCg0cvoX:3owom2rqoFo
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Estonia3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_wm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3884 unregmp2.exe Token: SeCreatePagefilePrivilege 3884 unregmp2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 748 wrote to memory of 4560 748 Estonia3.exe 73 PID 748 wrote to memory of 4560 748 Estonia3.exe 73 PID 748 wrote to memory of 4560 748 Estonia3.exe 73 PID 4560 wrote to memory of 4516 4560 wmplayer.exe 74 PID 4560 wrote to memory of 4516 4560 wmplayer.exe 74 PID 4560 wrote to memory of 4516 4560 wmplayer.exe 74 PID 4560 wrote to memory of 4776 4560 wmplayer.exe 75 PID 4560 wrote to memory of 4776 4560 wmplayer.exe 75 PID 4560 wrote to memory of 4776 4560 wmplayer.exe 75 PID 4776 wrote to memory of 3884 4776 unregmp2.exe 76 PID 4776 wrote to memory of 3884 4776 unregmp2.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\Estonia3.exe"C:\Users\Admin\AppData\Local\Temp\Estonia3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe/device:dvd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce: /device:dvd3⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT4⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD50e807656bd86f2aef7ccf207f963973b
SHA127052af8d103d134369e356b793eb88ba873df55
SHA256c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162
SHA512e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
546B
MD5df03e65b8e082f24dab09c57bc9c6241
SHA16b0dacbf38744c9a381830e6a5dc4c71bd7cedbf
SHA256155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba
SHA512ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99
-
Filesize
523B
MD5d58da90d6dc51f97cb84dfbffe2b2300
SHA15f86b06b992a3146cb698a99932ead57a5ec4666
SHA25693acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad
SHA5127f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636
-
Filesize
1KB
MD5de86d5ab51cce6f26a2ec15591b6c0ad
SHA1f163ddf32e5ab5cbe41e0986bfca6b14572eef5d
SHA2565ad4d33c00b7e06f4761895ec2c36c5300f4ac6e3fbd273a024477e5d0036ce8
SHA512810f19c7c304f57eb942242ed271a025aad759810f17550f6f241a4606cb44c03c8d2731794c74bb43f666bdba1847dbbe8aa852b4a41b29912c33f25bf85391