Resubmissions
27-09-2024 19:17
240927-xzjlksvemr 627-09-2024 19:13
240927-xw9zcsvdqp 627-09-2024 19:09
240927-xt6txsvdlm 627-09-2024 19:02
240927-xp9p1svclk 6Analysis
-
max time kernel
147s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27-09-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
Daisy's Destruction/Videos/daysy1.mp4
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Daisy's Destruction/Videos/daysy2.mp4
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Daisy's Destruction/Videos/daysy3.mp4
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Daisy's Destruction/Videos/daysy4.mp4
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Daisy's Destruction/Videos/intro-DD.mp4
Resource
win10-20240404-en
General
-
Target
Daisy's Destruction/Videos/daysy3.mp4
-
Size
26.7MB
-
MD5
4067501d3966c982fffa2cca7be4620f
-
SHA1
9cae0a9fe9099c770432a5da9088ab828f0b52d1
-
SHA256
fdeb24efd395dd182cb981b3ff052428f8ca599d6c23b639d6c05e7d3eed2b5c
-
SHA512
737e1ae07012799d0352163d7ec19fbc2203363de5ef2edd6452c5fdd9cb3d510b9ff0ce7a97d03860cebd0eb37ca8cc8703b780cef0293ddf01d6bfd2f7f2a3
-
SSDEEP
786432:4kgNelGmhjoa20vrQ0QBsqS575bMDfy/rGS:JgoHhEapM4qSllufy/rGS
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_wm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3548 unregmp2.exe Token: SeCreatePagefilePrivilege 3548 unregmp2.exe Token: SeShutdownPrivilege 2396 wmplayer.exe Token: SeCreatePagefilePrivilege 2396 wmplayer.exe Token: 33 4544 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4544 AUDIODG.EXE Token: SeShutdownPrivilege 2396 wmplayer.exe Token: SeCreatePagefilePrivilege 2396 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 wmplayer.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2856 wrote to memory of 4964 2856 wmplayer.exe 73 PID 2856 wrote to memory of 4964 2856 wmplayer.exe 73 PID 2856 wrote to memory of 4964 2856 wmplayer.exe 73 PID 2856 wrote to memory of 4304 2856 wmplayer.exe 74 PID 2856 wrote to memory of 4304 2856 wmplayer.exe 74 PID 2856 wrote to memory of 4304 2856 wmplayer.exe 74 PID 4304 wrote to memory of 3548 4304 unregmp2.exe 75 PID 4304 wrote to memory of 3548 4304 unregmp2.exe 75 PID 4964 wrote to memory of 2396 4964 setup_wm.exe 76 PID 4964 wrote to memory of 2396 4964 setup_wm.exe 76 PID 4964 wrote to memory of 2396 4964 setup_wm.exe 76
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Daisy's Destruction\Videos\daysy3.mp4"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Daisy's Destruction\Videos\daysy3.mp4"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Daisy's Destruction\Videos\daysy3.mp4"3⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2396
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
- Drops file in Windows directory
PID:512
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD50e807656bd86f2aef7ccf207f963973b
SHA127052af8d103d134369e356b793eb88ba873df55
SHA256c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162
SHA512e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3
-
Filesize
1024KB
MD508ea7c1b5ff52d081d8252855cd28667
SHA1aafe2e86d9983f8f16f7f90f49949baedd3ec82f
SHA256445211e69397b8323c6e8c14299c3c2e50a42b280943e30b7bc28ac47b243d22
SHA5127204a9a9cc14b4b7d47eaa30903ee37f5b7b5c34fe70763e838e9b2f476738e4af8aecea106fdc3999947c1dbf72065f9030767858904565a9ec015ab1318858
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD57346a6c94534bc89c1c8654a0ac642e4
SHA175c1325e488475e3959c8839f54b5d51bd63e550
SHA256d92f44e34cc72b2e3f80cf007c00f4bfca295410ce926c236b99e4bc787508c3
SHA5126521242fce2fed423206b58b663e006a08dc4fe9b59ba3acb0cb0e84988666690c745e11fbc7e29b327c7b85d5bb0ed72743719f52687fe2b0cf0a553b81a935