Overview
overview
10Static
static
1042 prikolyxa.zip
windows10-2004-x64
142 prikoly...db.dll
windows10-2004-x64
142 prikoly...db.dll
windows10-2004-x64
142 prikoly...ks.dll
windows10-2004-x64
142 prikoly...il.dll
windows10-2004-x64
142 prikoly...ts.dll
windows10-2004-x64
142 prikoly...re.dll
windows10-2004-x64
142 prikoly...rs.dll
windows10-2004-x64
142 prikoly...ed.dll
windows10-2004-x64
142 prikoly...ls.dll
windows10-2004-x64
142 prikoly...io.dll
windows10-2004-x64
142 prikoly...on.dll
windows10-2004-x64
142 prikoly...ws.dll
windows10-2004-x64
142 prikoly...ne.dll
windows10-2004-x64
142 prikoly...at.dll
windows10-2004-x64
142 prikoly...rd.dll
windows10-2004-x64
142 prikoly...ss.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...DP.dll
windows10-2004-x64
142 prikoly...NC.dll
windows10-2004-x64
142 prikoly...ry.dll
windows10-2004-x64
142 prikoly...ps.dll
windows10-2004-x64
142 prikoly...ns.dll
windows10-2004-x64
142 prikoly...er.dll
windows10-2004-x64
142 prikoly...me.txt
windows10-2004-x64
142 prikoly...at.wav
windows10-2004-x64
642 prikoly...ro.wav
windows10-2004-x64
642 prikoly...xe.xml
windows10-2004-x64
142 prikoly...config
windows10-2004-x64
342 prikoly...config
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 23:03
Behavioral task
behavioral1
Sample
42 prikolyxa.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
42 prikolyxa/Mono.Cecil.Mdb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
42 prikolyxa/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
42 prikolyxa/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
42 prikolyxa/Mono.Cecil.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
42 prikolyxa/MonoMod.Backports.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
42 prikolyxa/MonoMod.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
42 prikolyxa/MonoMod.ILHelpers.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
42 prikolyxa/MonoMod.Iced.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
42 prikolyxa/MonoMod.Utils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
42 prikolyxa/NAudio.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
42 prikolyxa/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
42 prikolyxa/Plugins/ActiveWindows.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
42 prikolyxa/Plugins/All-In-One.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
42 prikolyxa/Plugins/Chat.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
42 prikolyxa/Plugins/Clipboard.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
42 prikolyxa/Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
42 prikolyxa/Plugins/FileManager.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
42 prikolyxa/Plugins/FileSeacher.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
42 prikolyxa/Plugins/HBrowser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
42 prikolyxa/Plugins/HRDP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
42 prikolyxa/Plugins/HVNC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
42 prikolyxa/Plugins/HVNCMemory.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
42 prikolyxa/Plugins/HiddenApps.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
42 prikolyxa/Plugins/Informations.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
42 prikolyxa/Plugins/Keylogger.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
42 prikolyxa/Readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
42 prikolyxa/Sounds/Chat.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
42 prikolyxa/Sounds/Intro.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
42 prikolyxa/XWorm V5.2.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
42 prikolyxa/XWormLoader 5.2 x32.exe.config
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
42 prikolyxa/XWormLoader 5.2 x64.exe.config
Resource
win10v2004-20240802-en
General
-
Target
42 prikolyxa/Sounds/Intro.wav
-
Size
238KB
-
MD5
ad3b4fae17bcabc254df49f5e76b87a6
-
SHA1
1683ff029eebaffdc7a4827827da7bb361c8747e
-
SHA256
e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
-
SHA512
3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
SSDEEP
3072:FU3hYG9X9JzhaLL5+QYKHZDa6D+4LT92KEpcP+b8FGUt0Ybs5e9jXjubLtNmBNs9:GjVsLL5lva6D+4P9llWvaGe9CHeBNm
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2392887640-1187051047-2909758433-1000\{9AFE64C0-BC67-4610-BF68-A1E45E944FDC} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3376 unregmp2.exe Token: SeCreatePagefilePrivilege 3376 unregmp2.exe Token: SeShutdownPrivilege 1180 wmplayer.exe Token: SeCreatePagefilePrivilege 1180 wmplayer.exe Token: 33 4072 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4072 AUDIODG.EXE Token: SeShutdownPrivilege 1180 wmplayer.exe Token: SeCreatePagefilePrivilege 1180 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1180 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4604 1180 wmplayer.exe 85 PID 1180 wrote to memory of 4604 1180 wmplayer.exe 85 PID 1180 wrote to memory of 4604 1180 wmplayer.exe 85 PID 4604 wrote to memory of 3376 4604 unregmp2.exe 87 PID 4604 wrote to memory of 3376 4604 unregmp2.exe 87
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\42 prikolyxa\Sounds\Intro.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1612
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c4 0x2441⤵
- Suspicious use of AdjustPrivilegeToken
PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD55f77e2589660a79c038fbb3c0801827c
SHA12d3ae441464869ec3a13409b8151f56d1f214c61
SHA256cc3ac2f756132a1a7491374df8d2422589e4c739d3cfe544cc5965f07fb19d53
SHA5129bf1d722ffee0fa0b1788fb75b93ca1f259c4c398443e0d7123211a4a92a74ede8dd9b3e203dd6fa8ce368dcfab2436311dbbf36210893e72a253fd2845639ca
-
Filesize
1024KB
MD5da116dd3c14509595a81e7725fb7b1c9
SHA1202166a2769cee3393245d52837b506afcd2ebd1
SHA256a291d0fc3c668b54cfaf02376b993829946853b90475d1f65db7c31e478cea88
SHA512a649b734ddfd3dd45602b4153d36b4890a7a62b97119fe13c15d4d3889f453cd675155028560f86c041784f217359ee78fa5eda64c154b66c8f6c44b572811dc
-
Filesize
68KB
MD559737b30e6237190046ca6d8592e4176
SHA135b103ca14bec781d916e5edc4a502743cfe70e9
SHA2563b122bf17a90d5127b756a429e1933ba2427d90407419868e919d5996ab66ab6
SHA5122f43652dce126da0428c52672feeb4ff0856e57751f649c39cc72870ec27627dc7f681048bb305ebbf55cd5f67df676afc0cf44d1c4c7af7c47d557ea6f19c19
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD54f15c894e062bffd24c36c560a9a7dc5
SHA110508adccbac09b965910a3202b63e78b2086c86
SHA2565f559c23ed2ded280ffc74ee1645a358333346173a9fe99c9057512d5887808a
SHA5120e8d1e90f84b4e2321421bd389fdc62496565916c6c58657be3aa2a53cd82d80c7f2ba24a67a8279961770f4cbe0467cb030eb3b957bb082e9a96f5671dee9a7