Overview
overview
10Static
static
1042 prikolyxa.zip
windows10-2004-x64
142 prikoly...db.dll
windows10-2004-x64
142 prikoly...db.dll
windows10-2004-x64
142 prikoly...ks.dll
windows10-2004-x64
142 prikoly...il.dll
windows10-2004-x64
142 prikoly...ts.dll
windows10-2004-x64
142 prikoly...re.dll
windows10-2004-x64
142 prikoly...rs.dll
windows10-2004-x64
142 prikoly...ed.dll
windows10-2004-x64
142 prikoly...ls.dll
windows10-2004-x64
142 prikoly...io.dll
windows10-2004-x64
142 prikoly...on.dll
windows10-2004-x64
142 prikoly...ws.dll
windows10-2004-x64
142 prikoly...ne.dll
windows10-2004-x64
142 prikoly...at.dll
windows10-2004-x64
142 prikoly...rd.dll
windows10-2004-x64
142 prikoly...ss.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...DP.dll
windows10-2004-x64
142 prikoly...NC.dll
windows10-2004-x64
142 prikoly...ry.dll
windows10-2004-x64
142 prikoly...ps.dll
windows10-2004-x64
142 prikoly...ns.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...me.txt
windows10-2004-x64
142 prikoly...at.wav
windows10-2004-x64
642 prikoly...ro.wav
windows10-2004-x64
642 prikoly...xe.xml
windows10-2004-x64
142 prikoly...config
windows10-2004-x64
342 prikoly...config
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 23:03
Behavioral task
behavioral1
Sample
42 prikolyxa.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
42 prikolyxa/Mono.Cecil.Mdb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
42 prikolyxa/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
42 prikolyxa/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
42 prikolyxa/Mono.Cecil.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
42 prikolyxa/MonoMod.Backports.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
42 prikolyxa/MonoMod.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
42 prikolyxa/MonoMod.ILHelpers.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
42 prikolyxa/MonoMod.Iced.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
42 prikolyxa/MonoMod.Utils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
42 prikolyxa/NAudio.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
42 prikolyxa/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
42 prikolyxa/Plugins/ActiveWindows.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
42 prikolyxa/Plugins/All-In-One.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
42 prikolyxa/Plugins/Chat.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
42 prikolyxa/Plugins/Clipboard.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
42 prikolyxa/Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
42 prikolyxa/Plugins/FileManager.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
42 prikolyxa/Plugins/FileSeacher.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
42 prikolyxa/Plugins/HBrowser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
42 prikolyxa/Plugins/HRDP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
42 prikolyxa/Plugins/HVNC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
42 prikolyxa/Plugins/HVNCMemory.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
42 prikolyxa/Plugins/HiddenApps.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
42 prikolyxa/Plugins/Informations.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
42 prikolyxa/Plugins/Keylogger.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
42 prikolyxa/Readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
42 prikolyxa/Sounds/Chat.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
42 prikolyxa/Sounds/Intro.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
42 prikolyxa/XWorm V5.2.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
42 prikolyxa/XWormLoader 5.2 x32.exe.config
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
42 prikolyxa/XWormLoader 5.2 x64.exe.config
Resource
win10v2004-20240802-en
General
-
Target
42 prikolyxa/Sounds/Chat.wav
-
Size
45KB
-
MD5
832a3652fd780edcdb2439ec33532c0d
-
SHA1
f0754ee6519d77700f5ee5b744b8c99386d7b577
-
SHA256
45f4136e58a5f749d125d2ab54308f81954d2c5b364b66013660a6c358845d1e
-
SHA512
3b3b55afcdfa00d9b7085b20ed52a7b4d8b7d403f5d0d1c539781db1a20257efd8c856e19b8f32ea33766a580690b498ff063849519691a9a4cbbcd3e9447cd4
-
SSDEEP
768:QVPqefmaP5C3KduJn13jSHYHzIcr6DPW75Pvi3Fy5NQbIbhuJLA+LhDclY3Rp6:yP1mU5GlJnBS4TIQ6o163ofQ8b4Pfm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
Processes:
wmplayer.exedescription ioc process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
unregmp2.exewmplayer.exedescription ioc process File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe -
Drops file in Windows directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmplayer.exeunregmp2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
Processes:
wmplayer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{C5196CD2-6067-4ACB-A6EE-A4A179A5535E} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
wmplayer.exeunregmp2.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 4184 wmplayer.exe Token: SeCreatePagefilePrivilege 4184 wmplayer.exe Token: SeShutdownPrivilege 1276 unregmp2.exe Token: SeCreatePagefilePrivilege 1276 unregmp2.exe Token: 33 2908 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2908 AUDIODG.EXE Token: SeShutdownPrivilege 4184 wmplayer.exe Token: SeCreatePagefilePrivilege 4184 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
wmplayer.exepid process 4184 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
wmplayer.exeunregmp2.exedescription pid process target process PID 4184 wrote to memory of 4204 4184 wmplayer.exe unregmp2.exe PID 4184 wrote to memory of 4204 4184 wmplayer.exe unregmp2.exe PID 4184 wrote to memory of 4204 4184 wmplayer.exe unregmp2.exe PID 4204 wrote to memory of 1276 4204 unregmp2.exe unregmp2.exe PID 4204 wrote to memory of 1276 4204 unregmp2.exe unregmp2.exe
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\42 prikolyxa\Sounds\Chat.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1324
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD5bb11fb49e1c2a1915d4a1182c7c132c4
SHA1481d7d11c4b69d8b891c163e4e0ab93520f23d36
SHA256b5a0ba9108631254d83391bf62edc60d1fe446397b998ac9c72c680507db17fe
SHA512cd3b8661226261b3c8aeb5f472fd5d766f9e2d76283386e27efa3bbae758dfe4d86f9a4ae573e0cc4d0f008fe48a5203104d4f7dab27f277d44c21daef7156a7
-
Filesize
68KB
MD53a0b16eab1b66430bddd3ce0f96bb308
SHA119dfeb98763156fd4ae241315c453771b657d115
SHA256277b157dcacfdb625a3d5ecd81c8d13046beac765bf48ff9ca2cae1db3d2656b
SHA512753a604d16ac011c19f3f0eb5d5820034ba044c4d0ebe7c25e77352c81c07f8783333d16c0a5c8e909f929ebaee64f794b9ff72f66d49ce6b96eb4b4ecbf5a82
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD54c18f39ed7a146e20c6288ff6367c9a9
SHA15080dae380c24cbcb2366628a822e5d9444a9f6e
SHA256f1f635e0669bd3a15faaebc2aec400ae35c65df05a1fe059428f1849c34c0c85
SHA512922b2ec5ec2dfea53a3be237db4f4665781f760342279103559db1017c5f5251e8fe2ea0166b7be463a0e038d128663f8491f8882a6681c1b4f97957ca780244