Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 16:54
Behavioral task
behavioral1
Sample
Content-Warning-FixOnly.V4.rar
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Content-Warning-FixOnly.V4.rar
Resource
win10v2004-20240802-en
General
-
Target
Content-Warning-FixOnly.V4.rar
-
Size
10.8MB
-
MD5
c72c0720ec5b6b091f1ade7b408fa798
-
SHA1
3d0ce47719c1c4a74b05cf15d51ec50c6b419a0d
-
SHA256
a906f5e2277db56cf53f90d87f13b67d1c817e926866488b410c653711a15d23
-
SHA512
a1ad62c29974f81bebb4b7d50c4639e62a6e4ce9cd8ee49354a9ddc0e1225ebc322fcdedb75443bebf0829349adfb580d143095941d5e99719e11b05021525af
-
SSDEEP
196608:U7yW9CpOAu8UfXczS5C0FBswYRjcxlM3lrVYxNtiQRtB8DmaS5LEJSyLak8yKR9c:U7LMUfXKSglRjcxlM3lxeiQRWuEJmk8W
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2620 4032 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4704 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4032 wmplayer.exe Token: SeCreatePagefilePrivilege 4032 wmplayer.exe Token: SeShutdownPrivilege 956 unregmp2.exe Token: SeCreatePagefilePrivilege 956 unregmp2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4032 wmplayer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe 4704 OpenWith.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4824 4032 wmplayer.exe 105 PID 4032 wrote to memory of 4824 4032 wmplayer.exe 105 PID 4032 wrote to memory of 4824 4032 wmplayer.exe 105 PID 4824 wrote to memory of 956 4824 unregmp2.exe 106 PID 4824 wrote to memory of 956 4824 unregmp2.exe 106
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Content-Warning-FixOnly.V4.rar1⤵
- Modifies registry class
PID:1656
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4704
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4228
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 21642⤵
- Program crash
PID:2620
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4032 -ip 40321⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5563088ad0f20fabf9dd62c6ba8ae1636
SHA1f9cd2fd153afa1a12ff990cf27c32b8c9c44e878
SHA256eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184
SHA5128229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092
-
Filesize
1024KB
MD5f56680100d400fc89e1dc43ec7f6a245
SHA16936062d53e052ae507beba738c9aea5d22a5d90
SHA256cba8215e980656fd9ce86529eba206dd4373693c65c2942417ce754792353f65
SHA512e99db94945af9312c064da52b17988a02fe7082736e984edb8952561441901a71b6bef363a7383825b6930604b47db641e6bce17c17a9e8617d3bdc8423531cc
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5af10016b359b44e97cf31c1d6e80674d
SHA1bd40174c3774d6ed188dc5676a24b3e1447bb5e4
SHA2563ecbb63ccbb8cad7596541bea15af9946ea0ad99de2e96807758b243c33d27b0
SHA51216353f059f299e318aaee70ff78d15e82e5807a5d88ce0d7a1479770097b712d1d7883f8ef1d9744888de50d77afb16920479c99c6db752c570cab89df577537
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD51ffee3967abdbbe3964bd1a6494e290d
SHA1361e72a9bf87a0e63cc1d07a17c06c1c144ad564
SHA256443b4aed60d7709cb6102ccf577e739ef1f0595ee22f525a5f9b8eff1129de6f
SHA5121dda885ea06a1daabeb7274e62fbd306db7723dfff545ddc76eb011fc7fb59e703e925009282456d90cc020cb3ad23ebe4accce8e40ec40466011d594cae8bf3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD569efc5fae65479fd4cf5e6cebbe30bd0
SHA148ce4f9c6bb748c4a79891758074c3fa17491d36
SHA2564d4d8f0d52548973c4f811b7e370d21c2b3262613586c07be5f8c13db6232ff7
SHA5120794040fcb5c89e6299761a0842d4df4600f0b5b579280f8ba9bf8aee4488de0660db1b20c278a7f46ed430367206110321f051245b519d7157218fb867c578e