Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
Mp3Player_setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Mp3Player_setup.exe
Resource
win10v2004-20240802-en
General
-
Target
Mp3Player_setup.exe
-
Size
865KB
-
MD5
338e3ceec81641257061d825c9202b53
-
SHA1
00b69a1152e471556f26750af9d4282167964499
-
SHA256
3fedafe463b83d979939732e50afb19401025860f0ba943102ffd1307f8dcce6
-
SHA512
eeeafedb681f612beef41b7c708a809ac01da2a8f214caab56856e99feacc3d809e4c3b34abc7dca4c20260ec748b46be92f4a073760319f8c72b23eff94be5b
-
SSDEEP
24576:BI39d9XMMi4yyhh//FvWv9hYLueHn3qhRjhDW1:B6dJ/i4yyj/FvCQH3CrW1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3876 is-19PR4.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mp3Player_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-19PR4.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1904 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1904 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3876 1684 Mp3Player_setup.exe 84 PID 1684 wrote to memory of 3876 1684 Mp3Player_setup.exe 84 PID 1684 wrote to memory of 3876 1684 Mp3Player_setup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mp3Player_setup.exe"C:\Users\Admin\AppData\Local\Temp\Mp3Player_setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\is-KES4H.tmp\is-19PR4.tmp"C:\Users\Admin\AppData\Local\Temp\is-KES4H.tmp\is-19PR4.tmp" /SL4 $110052 "C:\Users\Admin\AppData\Local\Temp\Mp3Player_setup.exe" 627596 727042⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3876
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x328 0x4081⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD57737013450f8221f72fa1be96baf464a
SHA1cd2f627a77f6747746e42891c9f806ccebc6eeb6
SHA2567f9c5634cb3d20126e9e136420ca32d0d250a347836c95234e7e39d443da0f75
SHA512d4f8a743639117013a342d87f237964e98d5a5cf3b0fda4a6daf35434a451e59c238c220b8ed279a32a18af615ed23395e05588bc70045066b31eff8192977fc