Analysis
-
max time kernel
127s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
1511139141189123.mp4
Resource
win10v2004-20240802-en
General
-
Target
1511139141189123.mp4
-
Size
28.3MB
-
MD5
da3f84814438b891a4a2543c0eb127b7
-
SHA1
d2a9d301b5648d65deb3ddb46af80aabf097b22b
-
SHA256
f1a32365f598902ca6a66beca4bf83141262208217f86ce0339d437bc9423374
-
SHA512
51f33d8e856e7537d39bb5e7e4bdb1034648f35bf499caa8f44340de6c3fd307a10c1020b433dacc01fba1e1027fcf1e967bca42603c5d9b1b925b58e29b10cf
-
SSDEEP
393216:uZRFi6i+ifisWiniZiciLiCiFiwiFiwiFiwiFiwiFiwiFiwiFiwiFiwiFiwiFiw5:R
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-656926755-4116854191-210765258-1000\{0E436685-5072-46AA-B431-9F523F89C130} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 1112 unregmp2.exe Token: SeCreatePagefilePrivilege 1112 unregmp2.exe Token: 33 1592 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1592 AUDIODG.EXE Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe Token: SeShutdownPrivilege 3224 wmplayer.exe Token: SeCreatePagefilePrivilege 3224 wmplayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3224 wmplayer.exe 3224 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1212 3224 wmplayer.exe 84 PID 3224 wrote to memory of 1212 3224 wmplayer.exe 84 PID 3224 wrote to memory of 1212 3224 wmplayer.exe 84 PID 1212 wrote to memory of 1112 1212 unregmp2.exe 85 PID 1212 wrote to memory of 1112 1212 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\1511139141189123.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2756
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5c7ca2711d80cd052da0d98ce7e6dec6b
SHA1b051f0425224cf70e3a10636c21bf113bd1cd301
SHA256a0c1147d7f6adb99735dc3fa370ef6fb8e6ddd3687eb7afd677af5c71df6957f
SHA512487b985fe8a4fb9a0cb59ffb0b485133e0b089115e36b9bc3f0cbb64babd899daf1b282a9554b45874a59a4c7d9c07db370650c28a5731bde50f52e66a0fc0af
-
Filesize
1024KB
MD522c22807932e69226ba9434ed09276b0
SHA1f14270b7cbe6d54f1204a0c6f1318c73283c8d96
SHA2564a5c7aa7c81bb2fdc5c20dd122f7b4ca99f3f206bed12bc4a7f462060077b655
SHA5126c53d7bbc12e806b4be682e638b535b608da3c464ea5c83e1a51f03c56416db340a87090a13d888f1a66452aaacd5f53a7292eded06192928ec6d8a67bf0e630
-
Filesize
68KB
MD526ce914baed3697027e2318fe37b203b
SHA1b93464308160ed0537de746d70cec8deb947e9a9
SHA25678562dd829ac116b191d4ed0795b8244c59970acd841a2c727c39de80597b0be
SHA5125ec8c87c3c76590539b278cd59942ff07b887c4fe22ce87f403bc72b331f1b828061d681e970af5d03248d2d2788daea220f0cfbed99f133965754aa10d506a4
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD53a976c92042a28a5859fa45567be8880
SHA1ff57f2a24bef82b23f454a70b99125e5bc1871b7
SHA256fb4ce3e1172756940518b11713d6f2a209e3626e0cc57f1a647ec1f4a10aec45
SHA512e6925f061706e41f681bb20ef3a6bc8e651897a2b19bcd232bb636df92cf04ae3bc7721f4e4167abd8d75dfd203ccb7e52fd05e2371b8f7777cc781238ee76bf