Resubmissions

12-09-2024 20:50

240912-zmmtkstfkj 3

12-09-2024 20:47

240912-zlcxzsthne 6

Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 20:47

General

  • Target

    angrybirdsmaker0.4.2.1-dist/angrybirdsmaker0.4.2.1-dist/ABM_0.4.2.1_ASDK_.compiled/data_sdk/audio/cypigs/cypig_collision_06.wav

  • Size

    80KB

  • MD5

    931f772e3b6629e2e39d0467c597edca

  • SHA1

    03d19246344cf7db1c562b07560d140fc5a8001c

  • SHA256

    ba54a5fca6d2f0cd02827790afe74394cc5267d2509b88b568e17ea5e5236e3d

  • SHA512

    b85656128e347173fda25a6b86be9b018c0737f06e84f2a6bcfe7ba8e593d028d418b15b2758bd4254474fbc18acd54a817b8233c27c7237de1b8779ca55fcac

  • SSDEEP

    1536:cmamdZy6B6pc6wr8Y5LRq9HjhSr2deXmiVXqFVmkMmfkvJ+cS:6CUpcp8Yq9Z0mCDmfEJXS

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\angrybirdsmaker0.4.2.1-dist\angrybirdsmaker0.4.2.1-dist\ABM_0.4.2.1_ASDK_.compiled\data_sdk\audio\cypigs\cypig_collision_06.wav"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:3228
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:3236
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3d4 0x3cc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    44113ec0a4c2d6532c7136f0cca090dd

    SHA1

    9d5f943a43ddec47e6cfb4caa4627dc90b165fa7

    SHA256

    646ec9c4bc01b32135b3b12094a28ba74b395ff5ffee30b7512c8297ecef905d

    SHA512

    8a302e9518bb0e8fc9a27d23bd39edbab4f0ce06a1100ddc16498b72078d40d6c075f89931ec81adeb67171694939878052b4eb7ecebdcd2c85230a6e759d7ff

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    56e26feeeb60ad82b3eca2fbc808334a

    SHA1

    13c7b70ad2062b716c58c12ec96a1149836bef0e

    SHA256

    c10a0a0c04e7729d11258ab998c6b435133b0929cce4eb33324ec9100cddb843

    SHA512

    4d853b289d3b8e2135a0678cff5cac59945086da241bbed7d878ba9a89a0cee231fa2559e0ff57a84da52a105a9f12085d7676c7e9b8ee9c9bf1b71b9c510806

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    61208f1a947957a40d351cd2a8120396

    SHA1

    94ed1a1aefcdb261607bff95d6d96fffd66458a1

    SHA256

    b674876b4ba88ff86b024da48f82f573e7bc36adad58784e4ee4956c3c1a5422

    SHA512

    5a4d2aefd83c5df2579fe2d5dd419380c3d9d4add66df42eedc2398a1388f925e6261f9a2843047d3bdfe595c09e41dec715fbfe81a0045c1bc12d24ddc09537

  • memory/1548-31-0x00000000046D0000-0x00000000046E0000-memory.dmp

    Filesize

    64KB

  • memory/1548-30-0x00000000046D0000-0x00000000046E0000-memory.dmp

    Filesize

    64KB

  • memory/1548-29-0x00000000046D0000-0x00000000046E0000-memory.dmp

    Filesize

    64KB

  • memory/1548-32-0x00000000046D0000-0x00000000046E0000-memory.dmp

    Filesize

    64KB

  • memory/1548-34-0x00000000046D0000-0x00000000046E0000-memory.dmp

    Filesize

    64KB

  • memory/1548-33-0x00000000046D0000-0x00000000046E0000-memory.dmp

    Filesize

    64KB