Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 16:54

General

  • Target

    Content-Warning-FixOnly.V4.rar

  • Size

    10.8MB

  • MD5

    c72c0720ec5b6b091f1ade7b408fa798

  • SHA1

    3d0ce47719c1c4a74b05cf15d51ec50c6b419a0d

  • SHA256

    a906f5e2277db56cf53f90d87f13b67d1c817e926866488b410c653711a15d23

  • SHA512

    a1ad62c29974f81bebb4b7d50c4639e62a6e4ce9cd8ee49354a9ddc0e1225ebc322fcdedb75443bebf0829349adfb580d143095941d5e99719e11b05021525af

  • SSDEEP

    196608:U7yW9CpOAu8UfXczS5C0FBswYRjcxlM3lrVYxNtiQRtB8DmaS5LEJSyLak8yKR9c:U7LMUfXKSglRjcxlM3lxeiQRWuEJmk8W

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Content-Warning-FixOnly.V4.rar
    1⤵
    • Modifies registry class
    PID:1656
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4704
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4228
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 2164
        2⤵
        • Program crash
        PID:2620
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
      1⤵
      • Drops file in Windows directory
      PID:3880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4032 -ip 4032
      1⤵
        PID:4028

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        256KB

        MD5

        563088ad0f20fabf9dd62c6ba8ae1636

        SHA1

        f9cd2fd153afa1a12ff990cf27c32b8c9c44e878

        SHA256

        eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184

        SHA512

        8229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        1024KB

        MD5

        f56680100d400fc89e1dc43ec7f6a245

        SHA1

        6936062d53e052ae507beba738c9aea5d22a5d90

        SHA256

        cba8215e980656fd9ce86529eba206dd4373693c65c2942417ce754792353f65

        SHA512

        e99db94945af9312c064da52b17988a02fe7082736e984edb8952561441901a71b6bef363a7383825b6930604b47db641e6bce17c17a9e8617d3bdc8423531cc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

        Filesize

        498B

        MD5

        90be2701c8112bebc6bd58a7de19846e

        SHA1

        a95be407036982392e2e684fb9ff6602ecad6f1e

        SHA256

        644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

        SHA512

        d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

        Filesize

        9KB

        MD5

        5433eab10c6b5c6d55b7cbd302426a39

        SHA1

        c5b1604b3350dab290d081eecd5389a895c58de5

        SHA256

        23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

        SHA512

        207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

        Filesize

        9KB

        MD5

        7050d5ae8acfbe560fa11073fef8185d

        SHA1

        5bc38e77ff06785fe0aec5a345c4ccd15752560e

        SHA256

        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

        SHA512

        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        1KB

        MD5

        af10016b359b44e97cf31c1d6e80674d

        SHA1

        bd40174c3774d6ed188dc5676a24b3e1447bb5e4

        SHA256

        3ecbb63ccbb8cad7596541bea15af9946ea0ad99de2e96807758b243c33d27b0

        SHA512

        16353f059f299e318aaee70ff78d15e82e5807a5d88ce0d7a1479770097b712d1d7883f8ef1d9744888de50d77afb16920479c99c6db752c570cab89df577537

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        1KB

        MD5

        1ffee3967abdbbe3964bd1a6494e290d

        SHA1

        361e72a9bf87a0e63cc1d07a17c06c1c144ad564

        SHA256

        443b4aed60d7709cb6102ccf577e739ef1f0595ee22f525a5f9b8eff1129de6f

        SHA512

        1dda885ea06a1daabeb7274e62fbd306db7723dfff545ddc76eb011fc7fb59e703e925009282456d90cc020cb3ad23ebe4accce8e40ec40466011d594cae8bf3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        3KB

        MD5

        69efc5fae65479fd4cf5e6cebbe30bd0

        SHA1

        48ce4f9c6bb748c4a79891758074c3fa17491d36

        SHA256

        4d4d8f0d52548973c4f811b7e370d21c2b3262613586c07be5f8c13db6232ff7

        SHA512

        0794040fcb5c89e6299761a0842d4df4600f0b5b579280f8ba9bf8aee4488de0660db1b20c278a7f46ed430367206110321f051245b519d7157218fb867c578e

      • memory/4032-33-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-32-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-31-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-38-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-37-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-34-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-35-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB

      • memory/4032-30-0x00000000097F0000-0x0000000009800000-memory.dmp

        Filesize

        64KB