Resubmissions

09-10-2024 18:44

241009-xdlh2swbnc 6

09-10-2024 18:43

241009-xc1lkswbmd 1

Analysis

  • max time kernel
    145s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 18:44

General

  • Target

    Ther.mp3

  • Size

    4.8MB

  • MD5

    caf2e7bf786d09b60c352d6067623577

  • SHA1

    24a1a384376d53aa08308d54c51b8ad5be030b8f

  • SHA256

    a69ba03a6a908821c6783ab21252ad82272e2219bd4701ac6373901ebcd35535

  • SHA512

    0580fc7c0e4591e4982c9a68af326ca702859b0dfb6341dc745430569592ec22fa68cc0074158fac91f4141bf2d03f5ff30d48a484c45d86f88339dff343effe

  • SSDEEP

    98304:O5d2bKKUkII9D6wiseq6KZmJGYycMKu2QiuK3nX2LMz32wR8e0PrwDHatdwjc7tN:w0Nz9qJqsJGXkQy3X2wz32e0TwGzwI7b

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Ther.mp3"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1372
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:3216
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4076
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x514 0x49c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    576KB

    MD5

    ed6403a9e04010f1dec738de07aa712e

    SHA1

    1c106b90e799899f7b7d87430272720f05a47b2f

    SHA256

    65ac91d9fa770fe2025fa0866dcdbad3a33087f3aa7974150ad0d6d0c2b87432

    SHA512

    1ac9e6c73f062b10b5af5abf4131827ef347ecaf2295168d2f0ff92a03513a97634a2dcc0dbad40cd4427446fc76673749bbea4988eade919608d174117654b4

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    af470a3851a5cacb18105b7834592ea8

    SHA1

    12a029ec1c572404e1018786016d9810566378cf

    SHA256

    3fcb27d865b01439d3e83a0cabdd3af1c22011de04a7ed40283d31a205b5e4a0

    SHA512

    0802feab65b0447304c226534ec46c1141123da00f07cc47817c3305d6c3a3587c315bf4050d957787ea47d94a06f77fddb495c29f7e4a80e7785654715d9059

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    25fbe8c119a04f6613da383f311c42e7

    SHA1

    eca2fe759ce5ea1c5c893e74ac99c8b0ef585dc8

    SHA256

    8180c4f467211deb5fff40be455933df5371500502890789daac008997d6b5e9

    SHA512

    e8a8d505d181de60bd3e9e5487c8d94216e2b306a85339d5d72e8aec2555e0e3a688e2173542b763569671db1bf866217136e4d7ae72664ee70a869cb4c126cf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    5433eab10c6b5c6d55b7cbd302426a39

    SHA1

    c5b1604b3350dab290d081eecd5389a895c58de5

    SHA256

    23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

    SHA512

    207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    d1fe0a0f7d4a9baebdd5f0bd87a7abc2

    SHA1

    6e0a0a3f34310e01507930569cbd3b3ff67b6f7f

    SHA256

    e214f64c9764a953423a8bc12b816d855a2ee9201b9b1afbf3efd03b7aa960a0

    SHA512

    80eb44acf21aa50f284ce68c4b86965483f6e5eca07d13d4c0cf8080fc78860579237e1d0aacd598cfc17f38682b2859d212b1d99b6beb66ba1f313061b4ab44

  • memory/868-27-0x0000000004930000-0x0000000004940000-memory.dmp

    Filesize

    64KB

  • memory/868-28-0x0000000004930000-0x0000000004940000-memory.dmp

    Filesize

    64KB

  • memory/868-30-0x0000000004930000-0x0000000004940000-memory.dmp

    Filesize

    64KB

  • memory/868-29-0x0000000004930000-0x0000000004940000-memory.dmp

    Filesize

    64KB

  • memory/868-32-0x0000000004930000-0x0000000004940000-memory.dmp

    Filesize

    64KB

  • memory/868-31-0x0000000004930000-0x0000000004940000-memory.dmp

    Filesize

    64KB