Overview
overview
6Static
static
1Deadpool [...10.rar
windows7-x64
3Deadpool [...10.rar
windows10-2004-x64
3Deadpool [...orrent
windows7-x64
3Deadpool [...orrent
windows10-2004-x64
3Deadpool [...10.txt
windows7-x64
1Deadpool [...10.txt
windows10-2004-x64
1Deadpool [...10.url
windows7-x64
1Deadpool [...10.url
windows10-2004-x64
1Deadpool [...10.mp4
windows7-x64
1Deadpool [...10.mp4
windows10-2004-x64
6Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
Deadpool [TG] - TheFenix010.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Deadpool [TG] - TheFenix010.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Deadpool [TG] - TheFenix010/1. DeadpoolTheGame - TheFenix010.torrent
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Deadpool [TG] - TheFenix010/1. DeadpoolTheGame - TheFenix010.torrent
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Deadpool [TG] - TheFenix010/Importante leer!! - TheFenix010.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Deadpool [TG] - TheFenix010/Importante leer!! - TheFenix010.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Deadpool [TG] - TheFenix010/TheFenix010.url
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Deadpool [TG] - TheFenix010/TheFenix010.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Deadpool [TG] - TheFenix010/[Tutorial] - TheFenix010.mp4
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Deadpool [TG] - TheFenix010/[Tutorial] - TheFenix010.mp4
Resource
win10v2004-20240802-en
General
-
Target
Deadpool [TG] - TheFenix010/[Tutorial] - TheFenix010.mp4
-
Size
110.8MB
-
MD5
20b5ced24a079780a36de845b4c6c679
-
SHA1
b86ea293b35bf79e2b6ada9e2493a6cdc81046cd
-
SHA256
43e5f8ba6d44878feddb31bdc26d6b436074df7698d3751dbb28eac985bb7b67
-
SHA512
f92809b5f343689a146221098a84ce82cedf03aa10913badbb39877c251200674e425980efe06fa126c959b314739625a25f3a52bbe1ef0b18a0b076f734a621
-
SSDEEP
3145728:N4RYIc+avv52HbIJPjQwFjj6g1Rn1X/SMY:N4Rqt27IJfFmg1tti
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-786284298-625481688-3210388970-1000\{7D7F7249-D6B0-4475-B93C-750B2AEFC130} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4172 wmplayer.exe Token: SeCreatePagefilePrivilege 4172 wmplayer.exe Token: SeShutdownPrivilege 4332 unregmp2.exe Token: SeCreatePagefilePrivilege 4332 unregmp2.exe Token: 33 4968 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4968 AUDIODG.EXE Token: SeShutdownPrivilege 4172 wmplayer.exe Token: SeCreatePagefilePrivilege 4172 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4172 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1120 4172 wmplayer.exe 84 PID 4172 wrote to memory of 1120 4172 wmplayer.exe 84 PID 4172 wrote to memory of 1120 4172 wmplayer.exe 84 PID 1120 wrote to memory of 4332 1120 unregmp2.exe 85 PID 1120 wrote to memory of 4332 1120 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Deadpool [TG] - TheFenix010\[Tutorial] - TheFenix010.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4316
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x418 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5946f3d332664c951e4220b6529c08cf4
SHA18cef2495aeb0b14c503c53fe51282e7bdfa487a1
SHA256def03bbc743e3f1f8e1e7c235e05180fd3501857547d59eac77034bb17f54d16
SHA512a6ed17d51b299c250d9b50385e5a0c7c35dc388062d3d448fd2d55a001928518fb18f84a38a692af85d8f4b40b5e3a767724a0060702c842ac0bf8f83f9a67bc
-
Filesize
1024KB
MD5c5d80d15089e9c342547fe17c1952f97
SHA112246fb883412d7709964f8ed857ca7df0ce83a7
SHA2566b67053df0dd40d934b7471e6af68b89cbba9356d72808aecf59c7c74733842b
SHA51203fbdfdc08583cedd2d9fcd2a4c7203a92cfa8ac59f54cad0bbf35e2e3127758413253814a5285bee32d14e3779bc6b714c2bcb9ddae7dcb00e6258eecdde397
-
Filesize
68KB
MD5f825d4a2f2a42605d72e80dac3cdc9d8
SHA1252ae01a4f08bd473817a3c66840588fc7e89397
SHA2562e45679017a221386fd37203fef35df4818a23f79922c7e131d69c18f847fbac
SHA512517f11a99058bb2d3e05dc5fb7b4655480a8971f96e72f26cc31b0017655bc9a8271bf7794dc8c41876de61ab1400f1511bda6d4c6062850d87a2c5f368dc0fc
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD56fb1260ac7bc549178d55751ac03159d
SHA1180eb3c8e8562209216bc2c98575abc37d7ec322
SHA256f67ba58de50ddb29c6e7a30ffb3d0f13335d4f9e12392023da7a45ade96baa58
SHA512ea0273647b83e9cca1045d2a71c3f25db25ada613a79117c9de5fa8896e78341aa57533aa252103c668db6f92b5bc6a9dfb53683c4937db6805f0674c7515dc1