Resubmissions

27/09/2024, 19:17

240927-xzjlksvemr 6

27/09/2024, 19:13

240927-xw9zcsvdqp 6

27/09/2024, 19:09

240927-xt6txsvdlm 6

27/09/2024, 19:02

240927-xp9p1svclk 6

Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/09/2024, 19:09

General

  • Target

    Daisy's Destruction/Videos/daysy2.mp4

  • Size

    19.7MB

  • MD5

    f8e147c2b0a1a4b9d675994b2dff547a

  • SHA1

    45b968ce3a02c048147a569b1c60a79e79e899f7

  • SHA256

    6ebbcff1acde098d25593652b64cf309505d9eb869465f89735f5c284d2920de

  • SHA512

    c466c52c2adca9eedd6c245f0a6efc3b99a811da13525300c32a8e067bf7370a8d07854a5ad2e4ce6e768fcfa9ab77630f4dce0d2ea6acc4b84cd03575995c00

  • SSDEEP

    393216:tluiR4voZZN2SAsOWCV7PQiqov7zzx+VuWfpal0XkEo4w5n5w:OAf2geV8iPOuWfu0X455w

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Daisy's Destruction\Videos\daysy2.mp4"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Daisy's Destruction\Videos\daysy2.mp4"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Daisy's Destruction\Videos\daysy2.mp4"
        3⤵
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2344
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\System32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4424
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3d8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          64KB

          MD5

          0e807656bd86f2aef7ccf207f963973b

          SHA1

          27052af8d103d134369e356b793eb88ba873df55

          SHA256

          c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162

          SHA512

          e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          1024KB

          MD5

          7e9611902a2c9ac339f374bb9e444435

          SHA1

          cd0e4b0e9e9430a81e699fa725b11f52cbc5fbd9

          SHA256

          caec3f973c642d7719e469a132bd5b5d24caf3cd053592d483d73d9886525634

          SHA512

          012fc0bc8c8c6ab18f1aeeff7cfa14882dbac5a48abbb0513b2ebf8fbfd38b342f47261488835e87699ebc298c617f369f99bbe3ecc5e0c4fac0f1d600d6ddf6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          1KB

          MD5

          ecbb8c8c9edb2bc58f0239fed2ae8049

          SHA1

          c9e100558c9c838209ac6e5d3d95d4721c6b773a

          SHA256

          59c2a4eab8532c645fb6a814197dd57b584c37945859d09460645aba28540d6c

          SHA512

          5b15e25d60e4b1779225d821da47195163eb8b4c7607da08b31198bd1bd1b80fe0c75e8c7584913031c073a48f695116c007fa4e913858d2333338b0a605f364

        • memory/2344-40-0x0000000007560000-0x0000000007570000-memory.dmp

          Filesize

          64KB

        • memory/2344-43-0x0000000007560000-0x0000000007570000-memory.dmp

          Filesize

          64KB

        • memory/2344-42-0x0000000007560000-0x0000000007570000-memory.dmp

          Filesize

          64KB

        • memory/2344-41-0x0000000007560000-0x0000000007570000-memory.dmp

          Filesize

          64KB

        • memory/2344-46-0x000000000A270000-0x000000000A280000-memory.dmp

          Filesize

          64KB

        • memory/2344-47-0x0000000007560000-0x0000000007570000-memory.dmp

          Filesize

          64KB

        • memory/2344-48-0x0000000007560000-0x0000000007570000-memory.dmp

          Filesize

          64KB