Overview
overview
10Static
static
10Jules (2).zip
windows7-x64
1Jules (2).zip
windows10-2004-x64
1Jules/Mona...ng.css
windows7-x64
3Jules/Mona...ng.css
windows10-2004-x64
7Jules/Mona...et.css
windows7-x64
3Jules/Mona...et.css
windows10-2004-x64
7Jules/Mona...on.css
windows7-x64
3Jules/Mona...on.css
windows10-2004-x64
7Jules/Mona...et.css
windows7-x64
3Jules/Mona...et.css
windows10-2004-x64
7Jules/Mona...ks.css
windows7-x64
3Jules/Mona...ks.css
windows10-2004-x64
7Jules/Mona...er.css
windows7-x64
3Jules/Mona...er.css
windows10-2004-x64
7Jules/Mona...ts.css
windows7-x64
3Jules/Mona...ts.css
windows10-2004-x64
7Jules/Mona...et.css
windows7-x64
3Jules/Mona...et.css
windows10-2004-x64
7Jules/Mona...ld.css
windows7-x64
3Jules/Mona...ld.css
windows10-2004-x64
7Jules/Mona...on.css
windows7-x64
3Jules/Mona...on.css
windows10-2004-x64
7Jules/Mona...st.css
windows7-x64
3Jules/Mona...st.css
windows10-2004-x64
7Jules/Mona...et.css
windows7-x64
3Jules/Mona...et.css
windows10-2004-x64
7Jules/Mona...i.d.ts
windows7-x64
1Jules/Mona...i.d.ts
windows10-2004-x64
6Jules/Mona...lp.css
windows7-x64
3Jules/Mona...lp.css
windows10-2004-x64
7Jules/Mona...rd.css
windows7-x64
3Jules/Mona...rd.css
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 18:22
Behavioral task
behavioral1
Sample
Jules (2).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Jules (2).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Jules/Monaco/package/esm/vs/editor/contrib/folding/folding.css
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Jules/Monaco/package/esm/vs/editor/contrib/folding/folding.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Jules/Monaco/package/esm/vs/editor/contrib/gotoError/media/gotoErrorWidget.css
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Jules/Monaco/package/esm/vs/editor/contrib/gotoError/media/gotoErrorWidget.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Jules/Monaco/package/esm/vs/editor/contrib/gotoSymbol/link/goToDefinitionAtPosition.css
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Jules/Monaco/package/esm/vs/editor/contrib/gotoSymbol/link/goToDefinitionAtPosition.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Jules/Monaco/package/esm/vs/editor/contrib/gotoSymbol/peek/referencesWidget.css
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Jules/Monaco/package/esm/vs/editor/contrib/gotoSymbol/peek/referencesWidget.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Jules/Monaco/package/esm/vs/editor/contrib/links/links.css
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Jules/Monaco/package/esm/vs/editor/contrib/links/links.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Jules/Monaco/package/esm/vs/editor/contrib/message/messageController.css
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Jules/Monaco/package/esm/vs/editor/contrib/message/messageController.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Jules/Monaco/package/esm/vs/editor/contrib/parameterHints/parameterHints.css
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Jules/Monaco/package/esm/vs/editor/contrib/parameterHints/parameterHints.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Jules/Monaco/package/esm/vs/editor/contrib/peekView/media/peekViewWidget.css
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Jules/Monaco/package/esm/vs/editor/contrib/peekView/media/peekViewWidget.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Jules/Monaco/package/esm/vs/editor/contrib/rename/renameInputField.css
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Jules/Monaco/package/esm/vs/editor/contrib/rename/renameInputField.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Jules/Monaco/package/esm/vs/editor/contrib/snippet/snippetSession.css
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Jules/Monaco/package/esm/vs/editor/contrib/snippet/snippetSession.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Jules/Monaco/package/esm/vs/editor/contrib/suggest/media/suggest.css
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Jules/Monaco/package/esm/vs/editor/contrib/suggest/media/suggest.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Jules/Monaco/package/esm/vs/editor/contrib/zoneWidget/zoneWidget.css
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Jules/Monaco/package/esm/vs/editor/contrib/zoneWidget/zoneWidget.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Jules/Monaco/package/esm/vs/editor/editor.api.d.ts
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Jules/Monaco/package/esm/vs/editor/editor.api.d.ts
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Jules/Monaco/package/esm/vs/editor/standalone/browser/accessibilityHelp/accessibilityHelp.css
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Jules/Monaco/package/esm/vs/editor/standalone/browser/accessibilityHelp/accessibilityHelp.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Jules/Monaco/package/esm/vs/editor/standalone/browser/iPadShowKeyboard/iPadShowKeyboard.css
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Jules/Monaco/package/esm/vs/editor/standalone/browser/iPadShowKeyboard/iPadShowKeyboard.css
Resource
win10v2004-20240802-en
General
-
Target
Jules/Monaco/package/esm/vs/editor/editor.api.d.ts
-
Size
252KB
-
MD5
514de49294c90b52399e017846b759e3
-
SHA1
59072b89b644cd814b508f3415f8529a80ef8e50
-
SHA256
712e6f0edb860883f4709eaf540ba688591c47881dc04b210162b62a779ddb54
-
SHA512
2655a75590f3653492013fd0e4533c8f85a2a4d86fd22df3dd14b285a7304296b72daf3bd3ce1eda3b9b274cde129569c3ddb94ef380353da979453ab3e8c6b4
-
SSDEEP
6144:nus6TlimttCyT/7oyCSoTM0BDMW0MtDVvZSqD2SzI4Wpv6+gZfPaj/P5bYwg6m85:nF6TliKCyT/7oyCSoTM0BDMW0MtDVvZO
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1824 wmplayer.exe Token: SeCreatePagefilePrivilege 1824 wmplayer.exe Token: SeShutdownPrivilege 3864 unregmp2.exe Token: SeCreatePagefilePrivilege 3864 unregmp2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1824 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1824 wrote to memory of 3900 1824 wmplayer.exe 84 PID 1824 wrote to memory of 3900 1824 wmplayer.exe 84 PID 1824 wrote to memory of 3900 1824 wmplayer.exe 84 PID 3900 wrote to memory of 3864 3900 unregmp2.exe 85 PID 3900 wrote to memory of 3864 3900 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:12 /Open "C:\Users\Admin\AppData\Local\Temp\Jules\Monaco\package\esm\vs\editor\editor.api.d.ts"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD545b65d525d68479dd499eafa16ddf1b4
SHA1d30bcabe4d9bb1ee7f080f6d771a247fe13a675d
SHA2560a435b672825a6cf7f208f2adf27a6ee0cfeb109f802f38854d4591045792f32
SHA51272c93d165e666de56549fb74d19c42224b678ddf05e0e47c83dd6695b5f49314e7081bd39ad470ddf893f40193a0daa99071fd30a3c37ba23918b19c52c3d639
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD52cfebdd0d87a760706b273ab28afc19b
SHA172331e8a5a60dbb392b99894831f1dd61a5215ac
SHA256224eb093f742ed4411d4c29a23855d92dbe0e1eb3b14399b7676bff776187d73
SHA5128f5c7b013418690601a9e720872c2917c7c698bd939c94094e67669ca2090269c859b00e7260cf02ea383377624651b475f07b42a9af9765bc7bcad83cd78aaf