Overview
overview
8Static
static
1Payload/Ma...32.png
windows7-x64
3Payload/Ma...32.png
windows10-2004-x64
3Payload/Ma...38.png
windows7-x64
3Payload/Ma...38.png
windows10-2004-x64
3Payload/Ma...48.png
windows7-x64
3Payload/Ma...48.png
windows10-2004-x64
3Payload/Ma...72.png
windows7-x64
3Payload/Ma...72.png
windows10-2004-x64
3Payload/Ma...t.json
windows7-x64
3Payload/Ma...t.json
windows10-2004-x64
3Payload/Ma...up.css
windows7-x64
3Payload/Ma...up.css
windows10-2004-x64
7Payload/Ma...es.xml
windows7-x64
3Payload/Ma...es.xml
windows10-2004-x64
1Payload/Ma...pi.cer
windows7-x64
8Payload/Ma...pi.cer
windows10-2004-x64
8Payload/Ma...ck.mp4
windows7-x64
1Payload/Ma...ck.mp4
windows10-2004-x64
6Payload/Ma.../c.wav
windows7-x64
1Payload/Ma.../c.wav
windows10-2004-x64
6Payload/Ma...er.cer
windows7-x64
8Payload/Ma...er.cer
windows10-2004-x64
8Payload/Ma...vision
windows7-x64
3Payload/Ma...vision
windows10-2004-x64
3Payload/Ma...eo.mov
windows7-x64
1Payload/Ma...eo.mov
windows10-2004-x64
6Payload/Ma...al.mp4
windows7-x64
1Payload/Ma...al.mp4
windows10-2004-x64
6Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-32.png
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-32.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-38.png
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-38.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-48.png
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-48.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-72.png
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-72.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/manifest.json
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/manifest.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/popup.css
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/popup.css
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Payload/Mabz.app/_CodeSignature/CodeResources.xml
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Payload/Mabz.app/_CodeSignature/CodeResources.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Payload/Mabz.app/api.cer
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Payload/Mabz.app/api.cer
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Payload/Mabz.app/back.mp4
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Payload/Mabz.app/back.mp4
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Payload/Mabz.app/c.wav
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Payload/Mabz.app/c.wav
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Payload/Mabz.app/cer.cer
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Payload/Mabz.app/cer.cer
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Payload/Mabz.app/embedded.mobileprovision
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Payload/Mabz.app/embedded.mobileprovision
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Payload/Mabz.app/onVideo.mov
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Payload/Mabz.app/onVideo.mov
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Payload/Mabz.app/tutorial.mp4
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Payload/Mabz.app/tutorial.mp4
Resource
win10v2004-20241007-en
General
-
Target
Payload/Mabz.app/c.wav
-
Size
212KB
-
MD5
b8c0604cd7f46d8f9c8fd1afcd3e7e96
-
SHA1
abafdb5022578082234542383b8111ab6985b485
-
SHA256
3b06f7a05a673513e18612a6c39b5c93110459a75b4a4c8d66855224840ec4cd
-
SHA512
c7b5cf20a7ac2b0510ff2fb6c561c9bf9222b29c44b5534315e2bebe3b806c57f4701834804eeed900c14d3edc6db3dc1e0b1407749121c2154e636fe8090efd
-
SSDEEP
6144:4FUgpNiyW3QbLHUq2A43b2UFXvoZOyaesYX+:4FUwcy1/HUM45VoZDa/YX+
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3442511616-637977696-3186306149-1000\{5C9F46C6-DD3E-43BA-ABD5-672C323E4DEA} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3536 wmplayer.exe Token: SeCreatePagefilePrivilege 3536 wmplayer.exe Token: SeShutdownPrivilege 1892 unregmp2.exe Token: SeCreatePagefilePrivilege 1892 unregmp2.exe Token: 33 3088 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3088 AUDIODG.EXE Token: SeShutdownPrivilege 3536 wmplayer.exe Token: SeCreatePagefilePrivilege 3536 wmplayer.exe Token: SeShutdownPrivilege 3536 wmplayer.exe Token: SeCreatePagefilePrivilege 3536 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3536 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4036 3536 wmplayer.exe 87 PID 3536 wrote to memory of 4036 3536 wmplayer.exe 87 PID 3536 wrote to memory of 4036 3536 wmplayer.exe 87 PID 4036 wrote to memory of 1892 4036 unregmp2.exe 88 PID 4036 wrote to memory of 1892 4036 unregmp2.exe 88
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\c.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3152
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x414 0x40c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD529bd18035ac3468ed8ee41ba90d66f22
SHA136e76825c5aff3f599ec16a85b14ee487595a69d
SHA256eca587e1d30a5a9c65a7f3d69272ebc2890a0ec954d1ee4ad7d5ac45bd95ddc8
SHA512b1b8a231de045c227d430c9edd5996b882153fd848fc319ba2dfbfc7aa309bce8a3551889f735f6de6d6fdfc09a1ffad4dcb4fd7ff2d4017eeb2c97f7a83f7d0
-
Filesize
1024KB
MD5c8d94b9c2bd0e9cce0e064dd8201cb08
SHA11227b8149493bd327507ea6d00e666208bd41f28
SHA2567fff027236cc0dc381a50eaad6a184e31467fa1c9768de7ab5383a92440be84a
SHA5123792b07918fc57b1c105497b135994013d861933d42e2d0209da574219794401ee031c891ca2429f26ead29aaeb54d128a411e200217405db5034f4501210814
-
Filesize
68KB
MD57feb053f759089d6ddb2154782dbb293
SHA14f642fce829e8a597caad3dc39a6464fae95ae35
SHA256d629f8ae727c9e12608cebadba427cde0b1a5c18c62f9afb7f2d5e38797b6e41
SHA512ef0b58e47a1fcc02253fda75f9a16daa785165d207c48923c30e64418386623db9941cd8ecbbd39ecb18317c4ac521d584165825d7d185bfe3b9996385e0e9ca
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5d9bac8e8577b7af0fad35e7c3a3a6e7b
SHA1ef2fcba1072d15e5640e256481bcd8c06eaa5d30
SHA256ca7fa9f16c68d19cda9afd578b86d5e2896321bdacd94d6dd49f5096c21905ba
SHA512c2cd461758cf2e47fb927f97e4185eb36dcde454e037b8b2ed37d2089d4621f2de6723b077b7b0f001bfae4eb0db04f21f36fafe113072e231c5f9782e21a1c6