Overview
overview
8Static
static
1Payload/Ma...32.png
windows7-x64
3Payload/Ma...32.png
windows10-2004-x64
3Payload/Ma...38.png
windows7-x64
3Payload/Ma...38.png
windows10-2004-x64
3Payload/Ma...48.png
windows7-x64
3Payload/Ma...48.png
windows10-2004-x64
3Payload/Ma...72.png
windows7-x64
3Payload/Ma...72.png
windows10-2004-x64
3Payload/Ma...t.json
windows7-x64
3Payload/Ma...t.json
windows10-2004-x64
3Payload/Ma...up.css
windows7-x64
3Payload/Ma...up.css
windows10-2004-x64
7Payload/Ma...es.xml
windows7-x64
3Payload/Ma...es.xml
windows10-2004-x64
1Payload/Ma...pi.cer
windows7-x64
8Payload/Ma...pi.cer
windows10-2004-x64
8Payload/Ma...ck.mp4
windows7-x64
1Payload/Ma...ck.mp4
windows10-2004-x64
6Payload/Ma.../c.wav
windows7-x64
1Payload/Ma.../c.wav
windows10-2004-x64
6Payload/Ma...er.cer
windows7-x64
8Payload/Ma...er.cer
windows10-2004-x64
8Payload/Ma...vision
windows7-x64
3Payload/Ma...vision
windows10-2004-x64
3Payload/Ma...eo.mov
windows7-x64
1Payload/Ma...eo.mov
windows10-2004-x64
6Payload/Ma...al.mp4
windows7-x64
1Payload/Ma...al.mp4
windows10-2004-x64
6Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-32.png
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-32.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-38.png
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-38.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-48.png
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-48.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-72.png
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/images/toolbar-icon-72.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/manifest.json
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/manifest.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/popup.css
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/popup.css
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Payload/Mabz.app/_CodeSignature/CodeResources.xml
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Payload/Mabz.app/_CodeSignature/CodeResources.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Payload/Mabz.app/api.cer
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Payload/Mabz.app/api.cer
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Payload/Mabz.app/back.mp4
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Payload/Mabz.app/back.mp4
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Payload/Mabz.app/c.wav
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Payload/Mabz.app/c.wav
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Payload/Mabz.app/cer.cer
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Payload/Mabz.app/cer.cer
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Payload/Mabz.app/embedded.mobileprovision
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Payload/Mabz.app/embedded.mobileprovision
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Payload/Mabz.app/onVideo.mov
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Payload/Mabz.app/onVideo.mov
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Payload/Mabz.app/tutorial.mp4
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Payload/Mabz.app/tutorial.mp4
Resource
win10v2004-20241007-en
General
-
Target
Payload/Mabz.app/tutorial.mp4
-
Size
3.5MB
-
MD5
2e37677355c16b4a441e43bccf55e604
-
SHA1
61a7a6e2c923fe63cbdc05da5f515998d905265b
-
SHA256
f1a150e78f4a91dfcf483b4e8dd3bc1ea523311f1e3b9c3e0f96ffd75ee56d20
-
SHA512
bafa238484487e8d45db3e623597f59d6bab25e0e4084fe790f585218bab3df096fb04883484f25216171063eb9bae4b181fc8c597aff90cb3c76a365bccb879
-
SSDEEP
49152:O008n1RUPi7cefz7KXxrzWFkqpjvGPuMO88rQsNhTfZeOUAIbcty2ysyrJL1wC6I:T0IqPve3kIvpju8rQShTBeOvYRL56I
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2878641211-696417878-3864914810-1000\{5A537751-A5AF-4DD4-BE19-72BCC1998E92} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4000 unregmp2.exe Token: SeCreatePagefilePrivilege 4000 unregmp2.exe Token: SeShutdownPrivilege 1680 wmplayer.exe Token: SeCreatePagefilePrivilege 1680 wmplayer.exe Token: 33 1488 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1488 AUDIODG.EXE Token: SeShutdownPrivilege 1680 wmplayer.exe Token: SeCreatePagefilePrivilege 1680 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3896 1680 wmplayer.exe 87 PID 1680 wrote to memory of 3896 1680 wmplayer.exe 87 PID 1680 wrote to memory of 3896 1680 wmplayer.exe 87 PID 3896 wrote to memory of 4000 3896 unregmp2.exe 88 PID 3896 wrote to memory of 4000 3896 unregmp2.exe 88
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\tutorial.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3636
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x2441⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c374c25875887db7d072033f817b6ce1
SHA13a6d10268f30e42f973dadf044dba7497e05cdaf
SHA25605d47b87b577841cc40db176ea634ec49b0b97066e192e1d48d84bb977e696b6
SHA5126a14f81a300695c09cb335c13155144e562c86bb0ddfdcab641eb3a168877ad3fcc0579ad86162622998928378ea2ffe5a244b3ddbe6c11a959dbb34af374a7d
-
Filesize
1024KB
MD5dbf64a6517f99e512209f4e9a95ad349
SHA1482b1e96e16800256ccd12bb23bd6c85cb311ba1
SHA256c667af7f790061e501075beb4589cf67cecd601e3adf18fdc77a69b6e00ba963
SHA512a8624d7dc146726dc6f70112c09a5b56d2704417c3b3d204b51ca201e265f9f59e3df0b62d452f1ec5b302c5e971073683a4980d64161c5e4c32f84f0318e3c6
-
Filesize
68KB
MD5a8ef9bca851cdd02082c1fba3379a061
SHA14bf794e8d6a53830af0cc894fb5f54f0dfe5cc1c
SHA25667a20853bcfd7b9cc4fb25535203ac8056b7084051089054595c0100bb7079fd
SHA51223ca2a6e962dd51deda6d16bab8b0424056364b7dea3b4d8e9c5f2f2b7e66456beeb241d68824112740f621c8bbff3eef15370f48beabef3bcf6707977d66689
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD51e79ee47f172eb6113b7103b20edb2a2
SHA1ceada521a756f2e21e34d5a06c0bfd5f202d969c
SHA25601efb7a3ca70fca2a3139455e944ed30e981f4f7c1384f09dc7093c0e160dc0a
SHA5127b70b08cbbe5d8220ff149cb4831e26023116b879c2ab14ec068a0bc06c2cd8ee70355b5cc732df858db5e922dc0859936a5d35c6ba5c03d66754a5d9af482af