Analysis
-
max time kernel
127s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 03:42
Behavioral task
behavioral1
Sample
cpk/alarm.wav
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cpk/alarm.wav
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cpk/cpk.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cpk/cpk.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20241007-en
General
-
Target
cpk/alarm.wav
-
Size
88KB
-
MD5
c9b00535154980ec38e2b4245a638d7b
-
SHA1
4756510665de26e9b72617484f9bb7035d042768
-
SHA256
3a2a723613509787bd44003a8b224e3cbb4746c0d113c426cafba3e73d855cfe
-
SHA512
da62c1c07147c18174bed3a62ffef1f8df2d88619583b0f55d83c23f82a26067f4e575d07e7a8829d6b8ca01a1050a76367cc6ec76be3f1ef21d9ec175db2394
-
SSDEEP
1536:dN5rKQbHywnzhTUN5rKQbHywnzhToN5rKQbHywnzhToN5rKQbHywnzhToN5rKQbs:f5Fj5K5Fj5a5Fj5a5Fj5a5Fj5a5Fj5aM
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-940901362-3608833189-1915618603-1000\{59CE5AB8-D135-44A0-A783-42963E78B6CE} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2992 wmplayer.exe Token: SeCreatePagefilePrivilege 2992 wmplayer.exe Token: SeShutdownPrivilege 1224 unregmp2.exe Token: SeCreatePagefilePrivilege 1224 unregmp2.exe Token: 33 4076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4076 AUDIODG.EXE Token: SeShutdownPrivilege 2992 wmplayer.exe Token: SeCreatePagefilePrivilege 2992 wmplayer.exe Token: SeShutdownPrivilege 2992 wmplayer.exe Token: SeCreatePagefilePrivilege 2992 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3636 2992 wmplayer.exe 84 PID 2992 wrote to memory of 3636 2992 wmplayer.exe 84 PID 2992 wrote to memory of 3636 2992 wmplayer.exe 84 PID 3636 wrote to memory of 1224 3636 unregmp2.exe 85 PID 3636 wrote to memory of 1224 3636 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\cpk\alarm.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3524
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3fc 0x2d41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5563088ad0f20fabf9dd62c6ba8ae1636
SHA1f9cd2fd153afa1a12ff990cf27c32b8c9c44e878
SHA256eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184
SHA5128229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092
-
Filesize
1024KB
MD5497346fc6abd0fddf810656a6069f2f5
SHA16bde40be79b09a82e525ecc322b42d4d13acb791
SHA256fc65e07cda6325794ebcba731316540fd2671bd797370b4c269f262632d8a788
SHA512f57d318fba7242ef912e92192f1e7b80f948e08d41e31b4735e699b73524463f1a0e7dbf09f2c02976894f836889e320cf42a56381006f490d7f849cf3a8d2b5
-
Filesize
68KB
MD5548e98f3244b1ed39e8ad30188fc327d
SHA1c13b48298755b28b3afd1bd4c0e38b9900641ca1
SHA256d316bc55658220be976b8c64ab2747cb2c9fe63c640f20f21c94d8e67285e05a
SHA512204385f9e99af484d1b3944a643158810e19998fe823cc263c1115c8a5ad4c8955653aed0058bab51954bad2d6b7346eba73584c4e7aff9e11fe7aed0b8d6932
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5b6d879466de13d494702b0960ac7b00a
SHA120edf42a74a304b6a6ae68254c36a9a90609f611
SHA2567c3c8ad37b093191a48ec3e9f0a714b1b25e32754d0cb38d276c5bdd9c96982a
SHA512913aacf6b0e06c351fb459858fbe1fa2201db71cce8462c8aaefc052f07e056b50d8f1bdf8749af4fb63bc9b5d95ae149fef0c2ab0dd1e5d0ebe12a83f0188c6