Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-09-2024 20:14

General

  • Target

    steamripbanned.mp4

  • Size

    140.4MB

  • MD5

    a8fe732b5ac1f962778d54e7fb57ddd8

  • SHA1

    527bc4e186dc2dd65abf33a8851e29a0a3dc4991

  • SHA256

    53023a7ee0e209c767de9a9dd20c42cf70a489312c844eb5ba8cb1a6a57ff7f2

  • SHA512

    bc208e53a0348d96c5e12c9168119b3bbe3a04241b292254403aee41363ed9a54c0e05ae717220e8fd76e28a398f784159e09fef02a2f67f23b4b8c25234a773

  • SSDEEP

    3145728:fgqTpuLF1fnLNTU+DEuYa+6qBoGVtv0if4XoPAD8WrrPe:H2nLhvYn6qbVaToYDJrG

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\steamripbanned.mp4"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\steamripbanned.mp4"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4032
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\System32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1752
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    64KB

    MD5

    0e807656bd86f2aef7ccf207f963973b

    SHA1

    27052af8d103d134369e356b793eb88ba873df55

    SHA256

    c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162

    SHA512

    e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oj5lf0pk.trn.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    feb0b0c083385f467b7c0d065b680236

    SHA1

    01662863f9b376d5f206bc9b640ce2f1a7444d2e

    SHA256

    193cd1cdd85dc26cd531d2c74e612f513eb831d0083e58a98f7f30a1a0c41208

    SHA512

    3c02ff1b1d9bfc8dd515c6074fdf4dda8614f51aebf770a6d20dbc13b4fd2d3e4e9c14a5ad68d207fea3ced7af1c8f051bb0cda9a1917e4cc8b7ee5bd1933b17

  • memory/1088-43-0x000001E751C50000-0x000001E751C72000-memory.dmp

    Filesize

    136KB

  • memory/1088-70-0x000001E76A3A0000-0x000001E76A3DC000-memory.dmp

    Filesize

    240KB

  • memory/1088-81-0x000001E76A460000-0x000001E76A4D6000-memory.dmp

    Filesize

    472KB