Analysis

  • max time kernel
    144s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 23:03

General

  • Target

    42 prikolyxa/Sounds/Chat.wav

  • Size

    45KB

  • MD5

    832a3652fd780edcdb2439ec33532c0d

  • SHA1

    f0754ee6519d77700f5ee5b744b8c99386d7b577

  • SHA256

    45f4136e58a5f749d125d2ab54308f81954d2c5b364b66013660a6c358845d1e

  • SHA512

    3b3b55afcdfa00d9b7085b20ed52a7b4d8b7d403f5d0d1c539781db1a20257efd8c856e19b8f32ea33766a580690b498ff063849519691a9a4cbbcd3e9447cd4

  • SSDEEP

    768:QVPqefmaP5C3KduJn13jSHYHzIcr6DPW75Pvi3Fy5NQbIbhuJLA+LhDclY3Rp6:yP1mU5GlJnBS4TIQ6o163ofQ8b4Pfm

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\42 prikolyxa\Sounds\Chat.wav"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1276
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:1324
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3cc 0x4e8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    64KB

    MD5

    987a07b978cfe12e4ce45e513ef86619

    SHA1

    22eec9a9b2e83ad33bedc59e3205f86590b7d40c

    SHA256

    f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8

    SHA512

    39b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    bb11fb49e1c2a1915d4a1182c7c132c4

    SHA1

    481d7d11c4b69d8b891c163e4e0ab93520f23d36

    SHA256

    b5a0ba9108631254d83391bf62edc60d1fe446397b998ac9c72c680507db17fe

    SHA512

    cd3b8661226261b3c8aeb5f472fd5d766f9e2d76283386e27efa3bbae758dfe4d86f9a4ae573e0cc4d0f008fe48a5203104d4f7dab27f277d44c21daef7156a7

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    3a0b16eab1b66430bddd3ce0f96bb308

    SHA1

    19dfeb98763156fd4ae241315c453771b657d115

    SHA256

    277b157dcacfdb625a3d5ecd81c8d13046beac765bf48ff9ca2cae1db3d2656b

    SHA512

    753a604d16ac011c19f3f0eb5d5820034ba044c4d0ebe7c25e77352c81c07f8783333d16c0a5c8e909f929ebaee64f794b9ff72f66d49ce6b96eb4b4ecbf5a82

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    5433eab10c6b5c6d55b7cbd302426a39

    SHA1

    c5b1604b3350dab290d081eecd5389a895c58de5

    SHA256

    23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

    SHA512

    207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    4c18f39ed7a146e20c6288ff6367c9a9

    SHA1

    5080dae380c24cbcb2366628a822e5d9444a9f6e

    SHA256

    f1f635e0669bd3a15faaebc2aec400ae35c65df05a1fe059428f1849c34c0c85

    SHA512

    922b2ec5ec2dfea53a3be237db4f4665781f760342279103559db1017c5f5251e8fe2ea0166b7be463a0e038d128663f8491f8882a6681c1b4f97957ca780244

  • memory/4184-31-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4184-29-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4184-30-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4184-28-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4184-33-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4184-32-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4184-40-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4184-43-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-44-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-45-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-46-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-48-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-49-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-51-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-50-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-52-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-54-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-53-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-60-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-61-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-62-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-63-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-65-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-64-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-66-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-67-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-68-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-69-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-70-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-72-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-71-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-73-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4184-74-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-75-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-76-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-77-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-84-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-83-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-82-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-81-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-80-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-78-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-79-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-85-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-86-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-90-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-89-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-88-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-87-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-91-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-93-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-92-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-94-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-95-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-97-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-96-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-98-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4184-99-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-101-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-100-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4184-102-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-104-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-103-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4184-105-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB