Resubmissions

12-09-2024 20:50

240912-zmmtkstfkj 3

12-09-2024 20:47

240912-zlcxzsthne 6

Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 20:47

General

  • Target

    angrybirdsmaker0.4.2.1-dist/angrybirdsmaker0.4.2.1-dist/ABM_0.4.2.1_ASDK_.compiled/data_sdk/audio/cypigs/cypig_collision_03.wav

  • Size

    64KB

  • MD5

    08a817d5a19bbcbf75e455d560acd606

  • SHA1

    0f51d45f1c5975d45e4c4a978b4aa1c21c08d5a7

  • SHA256

    5dc6a5f10053081796bf2bf28e1258f24dc09ff9484cba6ab74f4add593fe503

  • SHA512

    f0589dbce6de77a2e16bdec42837a76ce1e8e36e46b2c27d567f0d0f0b4b114cd0e2483cc1ff4d849fc46da4bb85eb5a9933a35de0b97062a08f108b51fd9cca

  • SSDEEP

    1536:Lf1yG+FLlQ9uwa7w4ni9171CmnKEwCX4BNipGFJGBW0gMLREv:L9yG+/Q9Av+71ZnKRCX4riwJqTlW

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\angrybirdsmaker0.4.2.1-dist\angrybirdsmaker0.4.2.1-dist\ABM_0.4.2.1_ASDK_.compiled\data_sdk\audio\cypigs\cypig_collision_03.wav"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:3600
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4396
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x340 0x520
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    896KB

    MD5

    ae6611ed692d654a53ae2e891758f8c8

    SHA1

    f4e1f1d82c1ccfebca9aacc8903ee028bce6f99a

    SHA256

    7c0e75565e1b7a768fffeef439ed74d0c710a648f9cd4562f6348308d409350a

    SHA512

    6fa2c3388a075fb9122b6f803a4c1aa96cd7ff35c50da77dc6322837bb92dc4f45691b3fbb33dfe6d23cc1d2f777f21d4a7ed30db9ff362b0b459cb114c031ca

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    89d910d09cfb71b168542e7a0795e6e7

    SHA1

    6f88946910e0919b731ccb312542e61f7ffda7ab

    SHA256

    e33321e9d93d1dd413783008ac4c9ce470703f65c9398bec47b194a0d1dfc971

    SHA512

    1e68e75ce2ad6590d682ee3cdb0fc161884326d319917f777160b712177c319dace635499bb8cda6d6649a3450e72a67b3e16e92411b81ff14f6b6cf655cf1a7

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    d7d9b085aed2fef30328beb5b9d96364

    SHA1

    45d812689272b23f0a49744f593e4453c833ab60

    SHA256

    66be7f475c381596890f1bbdb6dd034426bcc09c4ee2c547c1e0415ad40befd6

    SHA512

    72ac58eec1db94a03419054e20608de593ec6bfcbef0ce80da0f350e6207f8292b3f89f16fec8d4b2721eb9681a87949036584ff9885ab1f5d21d41caffcb658

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    2ba250eeeec8fa2cb13d7d477de289e0

    SHA1

    964f0f4d09937e70c15d1e86c050a1a9d9a9b059

    SHA256

    5ad3ca1054515f3d95d05e2f62d1522814a70d86250ef1c05a5407b64560fb1d

    SHA512

    d4eda6ca1a02afb34ebd719e09072fdcbf63cb74dcf1b2be04cee2f29b42f23824108dd407cfb9b298eec5ce8ecca0c76d1641e5f7f0f1d68a7f0fe8c7b317f6

  • memory/1344-31-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1344-34-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1344-33-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1344-32-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1344-36-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1344-35-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/1344-51-0x0000000008400000-0x0000000008410000-memory.dmp

    Filesize

    64KB

  • memory/1344-52-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-53-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-54-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-55-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-56-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-57-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-59-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-58-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-62-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-61-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-60-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-63-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-65-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-64-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-66-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-68-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-67-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-69-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-70-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-71-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-72-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-73-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-75-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-74-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-76-0x0000000008400000-0x0000000008410000-memory.dmp

    Filesize

    64KB

  • memory/1344-77-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-78-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-79-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-80-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-82-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-81-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-84-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-87-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-86-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-85-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-83-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-88-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-91-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-90-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-93-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-92-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-89-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-94-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-95-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-96-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-97-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-98-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-100-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-99-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-101-0x0000000008400000-0x0000000008410000-memory.dmp

    Filesize

    64KB

  • memory/1344-102-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-103-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB

  • memory/1344-104-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-105-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-107-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-106-0x0000000009FA0000-0x0000000009FB0000-memory.dmp

    Filesize

    64KB

  • memory/1344-108-0x0000000009F90000-0x0000000009FA0000-memory.dmp

    Filesize

    64KB