Overview
overview
6Static
static
3BeatEdit v1.2.006.7z
windows7-x64
3BeatEdit v1.2.006.7z
windows10-2004-x64
3BeatEdit v...ve.lua
windows7-x64
3BeatEdit v...ve.lua
windows10-2004-x64
3BeatEdit v...ua.bak
windows7-x64
3BeatEdit v...ua.bak
windows10-2004-x64
3BeatEdit v...ck.wav
windows7-x64
1BeatEdit v...ck.wav
windows10-2004-x64
6BeatEdit v...eg.exe
windows7-x64
1BeatEdit v...eg.exe
windows10-2004-x64
1BeatEdit v...in.exe
windows7-x64
1BeatEdit v...in.exe
windows10-2004-x64
3BeatEdit v...ge.png
windows7-x64
1BeatEdit v...ge.png
windows10-2004-x64
3BeatEdit v...gs.png
windows7-x64
1BeatEdit v...gs.png
windows10-2004-x64
3Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
BeatEdit v1.2.006.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BeatEdit v1.2.006.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BeatEdit v1.2.006/BeatEditForResolve.lua
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BeatEdit v1.2.006/BeatEditForResolve.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
BeatEdit v1.2.006/BeatEditForResolve.lua.bak
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
BeatEdit v1.2.006/BeatEditForResolve.lua.bak
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/audiofiles/click.wav
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/audiofiles/click.wav
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/ffmpeg/Win/ffmpeg.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/ffmpeg/Win/ffmpeg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/ibt/ibtWin.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/ibt/ibtWin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/images/beatColorOrderChange.png
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/images/beatColorOrderChange.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/images/settings.png
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
BeatEdit v1.2.006/BeatEditForResolve_Files/images/settings.png
Resource
win10v2004-20240802-en
General
-
Target
BeatEdit v1.2.006/BeatEditForResolve_Files/audiofiles/click.wav
-
Size
23KB
-
MD5
65b3b10e29bea8adcbc4af421958bb6d
-
SHA1
d44a471d1c3e545154e942615b46af01b637015a
-
SHA256
6d13680c4b3629c22ae2ff83574f214097892804ac73a92d74f102de908482a2
-
SHA512
62546b641be5611d804732c819610e070691b97f8d9667423e8a076e545d472f95aeb49d53d73681d2127f9ce9567edde9ade1f23584662bd5d403dc354cba5d
-
SSDEEP
384:brI4NbQ1Xuqrm+Z73GoZIw0xFfIfTwgFLOhD7qufB6e0ECj:brIt1+n+t3G0H6f2Tj1Owe60A
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{1F8142AC-653F-4CED-8E92-2F7B25FC32E4} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2860 wmplayer.exe Token: SeCreatePagefilePrivilege 2860 wmplayer.exe Token: SeShutdownPrivilege 2292 unregmp2.exe Token: SeCreatePagefilePrivilege 2292 unregmp2.exe Token: 33 2028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2028 AUDIODG.EXE Token: SeShutdownPrivilege 2860 wmplayer.exe Token: SeCreatePagefilePrivilege 2860 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3112 2860 wmplayer.exe 86 PID 2860 wrote to memory of 3112 2860 wmplayer.exe 86 PID 2860 wrote to memory of 3112 2860 wmplayer.exe 86 PID 3112 wrote to memory of 2292 3112 unregmp2.exe 87 PID 3112 wrote to memory of 2292 3112 unregmp2.exe 87
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\BeatEdit v1.2.006\BeatEditForResolve_Files\audiofiles\click.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4620
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD55ae1cd2f09d8c6eb36ca73dc59ceca98
SHA1d8fa83315d01ec1d409bfd3e12c134e4b56c6c6e
SHA256206df52f80d8f0dd32ddd976a85d465da0c262f4d3bc64c5dc49eda4012a0d4a
SHA512ea8732b394fca08ab368925e99d85aa4cb2e8943f825f695c475b6489b15d9cefa60d0a89e0685daa25471d50f3d40d5b0e0433ad1f15221d04d7e7bc9ed9fda
-
Filesize
68KB
MD53c0e92b34d363adb984053abb995fd79
SHA1f44eae76416d23dc35b6c8585209fe13d78a562f
SHA256c97ef19e385b3f1ca21b832073b48a32eef79a1a8dde259c99d90de99226da49
SHA512777c3b9f9d6c2f87875391a99b766bbea720edb93ecd7dfca1050a3007182c453445c9f82b4a2a44e8d16bf1b1c8b99914eed587c1788bc015ba75464186a04f
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD575c78e07b40e9a4b9b60dd291f559f76
SHA1038b622959ef655ea605b7e4c29bff9afd2bd67e
SHA256d2a1483a79c98987223fd0904571de1838b84c941f09df4ef90f6d43690acd38
SHA512b3c61dd5538344716c6406a1892329b6dd17c0d7f01cd8704eb5f4da02d6bd627beff416e90effab7cf40c87e62f25100f8191c1e0622bde49c9ee55b14d31a5