Resubmissions

15/10/2024, 23:54

241015-3x4fvsxemq 8

15/10/2024, 23:51

241015-3v719sxdrl 7

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 23:54

General

  • Target

    Payload/Mabz.app/onVideo.mov

  • Size

    4.6MB

  • MD5

    b61a8e8b22a2e8437bec98bc0dfc836e

  • SHA1

    f11ea0029ef2af666c1b0407f56c8a632f1b2fa9

  • SHA256

    22f52fa85bd35a90cc6c008f34434c436bdefc14c01177a8c25ba9bd2e7401e5

  • SHA512

    4d217faa7f664e61b20a397e61c629f2729289d22b6c6811c92d02f38891ac3f84107064a4b91eb83e339b5291f93c78dda49af7b5173c583bfeeebcfb6005ce

  • SSDEEP

    98304:P8myUtCEPbJt6DOWvwIm+m9r53wf2YGgcMuy4A:lymPlb+Ir9JMu6

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\onVideo.mov"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    384KB

    MD5

    4fc3d5fdacbe82ad336d10403e6e210d

    SHA1

    efef6929d340355b87a24fea3d4426ada900e5c7

    SHA256

    9088511c2658856feae585dac2044aa0030e4a813f3b553e59e5b7cb9402e7ac

    SHA512

    38ac6fb5560ef4f2681879643c89283d9b72f42a3c4804bebd979ff7ff5f3b628b57ca38a2106b361450ed91125c50fafb7d4c1a905dc469d6aa645cd9e914fb

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    9ec427fb5e8febd0520051e4df70956d

    SHA1

    c86b5271edf9c26779ec590669800a2307e02948

    SHA256

    dfdff48621ecf647b9830685457c09d41b630e95fcf8f68083108dd5dafab9b5

    SHA512

    5053c0f4c2ab36a33019c2d6ee9151c2eb2fec44bd9b09b15e41dd6712acb8454e9393c210d516fdb60284984a47bb1c0a897e3af75f1caccdaa9e424594f814

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    58ae5fa082900ca4b5fb0954bda2302a

    SHA1

    3b5cd0e7f9bcb9807a2fa8d38d38ac99bfe79bb5

    SHA256

    f49d02cde1c782f72da14c134282d375a4d363ff81bc8ae21a44c4faa76a8bd9

    SHA512

    f2d20df5f08983a076698255810ea4c3812e7e63057724bdbec07d733fca763c417c61605b0fa3ca1e9d5eca666ca3b6ebbe33864a52d4a16bcc03467eff644a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    5433eab10c6b5c6d55b7cbd302426a39

    SHA1

    c5b1604b3350dab290d081eecd5389a895c58de5

    SHA256

    23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

    SHA512

    207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    726f97c1f0d599449c55a5f40581101d

    SHA1

    5d92ad29067349352bfaad84a8f6bb677be352c6

    SHA256

    bec32d7b58b1342a87b86b7181da77f35a9c59335bbc83992aeae937817ecfd7

    SHA512

    a8b83ec93c255e63989c83e73452e241285677170ff634b45a688be3f20ca9795bf61c4b5e4be4de17c7034d4b02c853bd30e56590bd787cad40ba853c1e8dbc

  • memory/3880-33-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/3880-32-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/3880-30-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/3880-31-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/3880-34-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-35-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-37-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/3880-36-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/3880-38-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-43-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3880-49-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-51-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-52-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-53-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-54-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-55-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-57-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-56-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-60-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-59-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-58-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-65-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-67-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-66-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-69-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-70-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-68-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-71-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-72-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-73-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-74-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-75-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-76-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-77-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-78-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3880-79-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-80-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-81-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-82-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-83-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-84-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-86-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-88-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-89-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-87-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-85-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-90-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-92-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-91-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-94-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-95-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-93-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-96-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-97-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-98-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-99-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-100-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-101-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-102-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-103-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3880-104-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-105-0x0000000007490000-0x00000000074A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-106-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-107-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB