Analysis
-
max time kernel
1782s -
max time network
1147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
TV Static and Color Bars Effect_Transition (4K).mp4
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TV Static and Color Bars Effect_Transition (4K).mp4
Resource
win10v2004-20240802-en
General
-
Target
TV Static and Color Bars Effect_Transition (4K).mp4
-
Size
1.1MB
-
MD5
6265ef09f0824b075b6ff43d12e27f84
-
SHA1
7be3696f621b82d4cf2d268cc12f3724177e625d
-
SHA256
6a3a71977c5f5bede91817d975603945d5a6e7baffc87930b42c64e1c5e877a1
-
SHA512
501de9677c6b02df2be59543a098344638a8331830a6c93903cdcf52f64552b39f10980d378e88fd3d53cd02b92dad44766e997f9535d3d25dd949adb7189822
-
SSDEEP
24576:tUqgPu+fseDgn9J5YFqauDutlYclWpgi/NW0wS94y5VWvzrp8f1:pgPu+JD+FYwFuDZspF/Nlj5VczrW1
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{488EBD5C-F4A2-4CF9-BF72-D1F22180B5AC} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4252 unregmp2.exe Token: SeCreatePagefilePrivilege 4252 unregmp2.exe Token: SeShutdownPrivilege 4732 wmplayer.exe Token: SeCreatePagefilePrivilege 4732 wmplayer.exe Token: 33 4976 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4976 AUDIODG.EXE Token: SeShutdownPrivilege 4732 wmplayer.exe Token: SeCreatePagefilePrivilege 4732 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4732 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4732 wrote to memory of 2508 4732 wmplayer.exe 82 PID 4732 wrote to memory of 2508 4732 wmplayer.exe 82 PID 4732 wrote to memory of 2508 4732 wmplayer.exe 82 PID 2508 wrote to memory of 4252 2508 unregmp2.exe 83 PID 2508 wrote to memory of 4252 2508 unregmp2.exe 83
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\TV Static and Color Bars Effect_Transition (4K).mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e0 0x2501⤵
- Suspicious use of AdjustPrivilegeToken
PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD54729e0d9550fece6951022e25a79316a
SHA16be567b7f228548d8a0dbcda9830d012554c4185
SHA256a9957af539cbb121ce7becd3925054e2b2e00e4f02b46968e68709edf208a882
SHA512f80389bc60d8a392d736d9b4c1386c709a472b10bc3512db8ee77cbd541ca55449e46d7866e06f7f6b91423a3eeab19a0006de9bc004ce61f0dc17c8c988086b
-
Filesize
68KB
MD59b3a0c44725c8303ea4976884af60056
SHA145891e20ce8b42f8ccc44028be7028b51347c77c
SHA2564b53d7568e98b27ce82fa83c080a903e7c9ae02e5b42b060d820520c6990e49a
SHA5127e46889fd69c46de9580cbcd8e40fd025bc0e7888132bc1eb7f7dd02b3b04515097e4285331b05def44ba77bdd9c0584f8fc58b69581ac11186c472bc398a740
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5aa51552ee2676a03437bd01a3d0ddd54
SHA1319800435918ef40cf2ed61c537c8e3328f5e629
SHA2564ad78f0a36f279baa0fee47ebb0f43048967708778f3fab3b978265923ee00bd
SHA5123a4c17b3077a3273290541fa5f4634484d1509e0cefb82091fb3ce793f50bbf23732e0d141cb56962922cb474019602c6d5c229ead03190cc9722368f044af39