Overview
overview
6Static
static
3ChessBot_demo.zip
windows7-x64
1ChessBot_demo.zip
windows10-2004-x64
1ChessBotX ...c.book
windows7-x64
3ChessBotX ...c.book
windows10-2004-x64
3ChessBotX ...M.book
windows7-x64
3ChessBotX ...M.book
windows10-2004-x64
3ChessBotX ...ot.exe
windows7-x64
5ChessBotX ...ot.exe
windows10-2004-x64
5ChessBotX ...+0.cfg
windows7-x64
3ChessBotX ...+0.cfg
windows10-2004-x64
3ChessBotX ...y).cfg
windows7-x64
3ChessBotX ...y).cfg
windows10-2004-x64
3ChessBotX ...em.cfg
windows7-x64
3ChessBotX ...em.cfg
windows10-2004-x64
3ChessBotX ...st.ini
windows7-x64
1ChessBotX ...st.ini
windows10-2004-x64
1ChessBotX ...sh.cfg
windows7-x64
3ChessBotX ...sh.cfg
windows10-2004-x64
3ChessBotX ...32.cfg
windows7-x64
3ChessBotX ...32.cfg
windows10-2004-x64
3ChessBotX ...gs.ini
windows7-x64
1ChessBotX ...gs.ini
windows10-2004-x64
1ChessBotX ...ys.cfg
windows7-x64
3ChessBotX ...ys.cfg
windows10-2004-x64
3ChessBotX ...ts.cfg
windows7-x64
3ChessBotX ...ts.cfg
windows10-2004-x64
3ChessBotX ...s.dcfg
windows7-x64
3ChessBotX ...s.dcfg
windows10-2004-x64
3ChessBotX ...a1.mp3
windows7-x64
1ChessBotX ...a1.mp3
windows10-2004-x64
6ChessBotX ...a2.mp3
windows7-x64
1ChessBotX ...a2.mp3
windows10-2004-x64
6Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
ChessBot_demo.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ChessBot_demo.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ChessBotX Trial/Books/Basic.book
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
ChessBotX Trial/Books/Basic.book
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ChessBotX Trial/Books/GM.book
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
ChessBotX Trial/Books/GM.book
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ChessBotX Trial/ChessBot.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
ChessBotX Trial/ChessBot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ChessBotX Trial/Config/Delays for bullet 1+0.cfg
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
ChessBotX Trial/Config/Delays for bullet 1+0.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ChessBotX Trial/Config/Instant (without delay).cfg
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
ChessBotX Trial/Config/Instant (without delay).cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ChessBotX Trial/Config/system.cfg
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
ChessBotX Trial/Config/system.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ChessBotX Trial/EngineList.ini
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
ChessBotX Trial/EngineList.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ChessBotX Trial/Engines Settings/stockfish.cfg
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
ChessBotX Trial/Engines Settings/stockfish.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ChessBotX Trial/Engines Settings/stockfish_10_x32.cfg
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
ChessBotX Trial/Engines Settings/stockfish_10_x32.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ChessBotX Trial/Settings.ini
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
ChessBotX Trial/Settings.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
ChessBotX Trial/System/SystemDelays.cfg
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
ChessBotX Trial/System/SystemDelays.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ChessBotX Trial/System/defaults.cfg
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
ChessBotX Trial/System/defaults.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
ChessBotX Trial/System/sys.dcfg
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
ChessBotX Trial/System/sys.dcfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
ChessBotX Trial/voiceover/a1.mp3
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
ChessBotX Trial/voiceover/a1.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ChessBotX Trial/voiceover/a2.mp3
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
ChessBotX Trial/voiceover/a2.mp3
Resource
win10v2004-20240802-en
General
-
Target
ChessBotX Trial/voiceover/a1.mp3
-
Size
2KB
-
MD5
ced1aa96b588829bb1c912b93b09882f
-
SHA1
1f9b35d87bfe06d0f6c04a9b54dffa4723350e80
-
SHA256
2a256643b2387848eac75a6af0b5e9f861ee552255525edf1cc0455c6870830d
-
SHA512
defa510c092c30af42fab5f76dc78d5e76b5ad7a862f7b6348309518c4e81728023f0f9e5273c6b4b6f333f87c7d02dd7a10b4d774d18839362ee75440f1cee6
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2392887640-1187051047-2909758433-1000\{F29D988E-B004-44B5-BE06-6DD33F70B60C} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3404 wmplayer.exe Token: SeCreatePagefilePrivilege 3404 wmplayer.exe Token: SeShutdownPrivilege 4824 unregmp2.exe Token: SeCreatePagefilePrivilege 4824 unregmp2.exe Token: 33 4596 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4596 AUDIODG.EXE Token: SeShutdownPrivilege 3404 wmplayer.exe Token: SeCreatePagefilePrivilege 3404 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3404 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3144 3404 wmplayer.exe 85 PID 3404 wrote to memory of 3144 3404 wmplayer.exe 85 PID 3404 wrote to memory of 3144 3404 wmplayer.exe 85 PID 3144 wrote to memory of 4824 3144 unregmp2.exe 87 PID 3144 wrote to memory of 4824 3144 unregmp2.exe 87
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\ChessBotX Trial\voiceover\a1.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2564
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x4b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c374c25875887db7d072033f817b6ce1
SHA13a6d10268f30e42f973dadf044dba7497e05cdaf
SHA25605d47b87b577841cc40db176ea634ec49b0b97066e192e1d48d84bb977e696b6
SHA5126a14f81a300695c09cb335c13155144e562c86bb0ddfdcab641eb3a168877ad3fcc0579ad86162622998928378ea2ffe5a244b3ddbe6c11a959dbb34af374a7d
-
Filesize
1024KB
MD592ac242312ba34c4634db9cffd66f000
SHA15e15769844ccc949096c08bb991600f6f9f1b895
SHA2561b53d7342121a54ddcc18147d3e3004101a24c93537ad46b57a7873905eeb669
SHA512b8b9e4a3103b975534960b8fbb7536c2eb384ca19d6696ffdd96b896bc413193e72eb30704db83f208868a0d8fc163d1fa92b0f48d08bf1d5e3bc2afa6550048
-
Filesize
68KB
MD53ba52432003650744d585bcb383df0d3
SHA17c5ea6b5871d9f2d8d99ada2c46044010b6c815c
SHA256c012b3b19eabf7de2b96f4df5f47235aa32f8e28db9d6c338f50570196c4ab8f
SHA5127563480f2ab2170154fd6f102120be7dc348786c44585a99ec62f74e4b6eb1773aaca47103d397550d29abf1b5519356db51911bd7600b258c1caa3edd7b91e3
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD501ab62591ec3c6a99222a7c714c67483
SHA161ecdf98e27eb568e19aac2a417f8ecfec3c4533
SHA2560e3206c68e5dc63923805d06b707da3c3b1239cfb44a7845661cdb7528a01130
SHA5124902ac278b9e05bd5fc3d35473dff8700f7b90081412245acf45a34e0da2cc467d769c1d09a65085b5e86b84d94088e67fd3d255383c60b58b3902ca0ae9ea79