Analysis

  • max time kernel
    196s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/08/2024, 20:35

General

  • Target

    Estonia3.exe

  • Size

    94KB

  • MD5

    cda4e955c9ed698a1df4ce736eb39d76

  • SHA1

    e8dacd52cb34c3d34bfe4a117511ce3991b2ae94

  • SHA256

    2812bff1ead67a077addcb6191a223fb213d4382610ba78c30bd410190195dc5

  • SHA512

    1a191d842b90afa223087dd71bed309a81f62405ac704e0c7d25879723723f67dcde88ffa70619eecc3b9e729df3d6e79476674d3f1c51f02739913486fd38a2

  • SSDEEP

    1536:2BDgolBDgoI7ZD2wNbdV+3h3t8OUEH23LiorMb6T9EDpVUjCQan38d8vRCg0cvoX:3owom2rqoFo

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Estonia3.exe
    "C:\Users\Admin\AppData\Local\Temp\Estonia3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      /device:dvd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
        "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce: /device:dvd
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4516
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Windows\System32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          4⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:3884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          64KB

          MD5

          0e807656bd86f2aef7ccf207f963973b

          SHA1

          27052af8d103d134369e356b793eb88ba873df55

          SHA256

          c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162

          SHA512

          e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Temp\tmp08203.WMC\allservices.xml

          Filesize

          546B

          MD5

          df03e65b8e082f24dab09c57bc9c6241

          SHA1

          6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf

          SHA256

          155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba

          SHA512

          ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

        • C:\Users\Admin\AppData\Local\Temp\tmp09468.WMC\serviceinfo.xml

          Filesize

          523B

          MD5

          d58da90d6dc51f97cb84dfbffe2b2300

          SHA1

          5f86b06b992a3146cb698a99932ead57a5ec4666

          SHA256

          93acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad

          SHA512

          7f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          1KB

          MD5

          de86d5ab51cce6f26a2ec15591b6c0ad

          SHA1

          f163ddf32e5ab5cbe41e0986bfca6b14572eef5d

          SHA256

          5ad4d33c00b7e06f4761895ec2c36c5300f4ac6e3fbd273a024477e5d0036ce8

          SHA512

          810f19c7c304f57eb942242ed271a025aad759810f17550f6f241a4606cb44c03c8d2731794c74bb43f666bdba1847dbbe8aa852b4a41b29912c33f25bf85391