Analysis
-
max time kernel
144s -
max time network
163s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-15 11-04-11.mkv
Resource
win11-20241023-en
General
-
Target
2024-11-15 11-04-11.mkv
-
Size
68.3MB
-
MD5
f5ba753b15a632a29fdee59c83d5a10b
-
SHA1
ad520f0b0d8b9639307d8e94109dd768d39350fa
-
SHA256
a9d88c6ba85d76eafb0ebb66c3b19850f182ac2a6a9abf210e5f4a3f53cd1bde
-
SHA512
97ff11ec5686168ae702fd4dddea173adca47b7390ea49010369ad8c7956bd1cc7b6239fadfa6d300d47eac67748c6646fa1e6f27fe80961161e26f68f055387
-
SSDEEP
1572864:LOFf96hiItrUgfo7CFlbtQO4LMTUigdh+o/Gij+hGUHna2YFgZ:L668qlbtt4LMTgdh+UK0UHndYFgZ
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4248760313-3670024077-2384670640-1000\{77DEE85F-986E-49F0-9A8D-F2DBACDA5550} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4920 wmplayer.exe Token: SeCreatePagefilePrivilege 4920 wmplayer.exe Token: SeShutdownPrivilege 1264 unregmp2.exe Token: SeCreatePagefilePrivilege 1264 unregmp2.exe Token: 33 2748 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2748 AUDIODG.EXE Token: SeShutdownPrivilege 4920 wmplayer.exe Token: SeCreatePagefilePrivilege 4920 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4920 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4116 4920 wmplayer.exe 79 PID 4920 wrote to memory of 4116 4920 wmplayer.exe 79 PID 4920 wrote to memory of 4116 4920 wmplayer.exe 79 PID 4116 wrote to memory of 1264 4116 unregmp2.exe 80 PID 4116 wrote to memory of 1264 4116 unregmp2.exe 80
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\2024-11-15 11-04-11.mkv"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:328
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD515e308dc3163dac5a05da73bf064ba20
SHA13100ed22db90108aaa90a90066bab19b3cbdaf1c
SHA256c5e0922ebeada460b145f712b012d5417acb31d90d560b5dbcb88a4c5b2558fb
SHA5123003908c1caa5be8f9e7f4a510d35a7f31b18b2aaacc9a5dd64f3bd4abae40b7c716a6a1a7d5124cb8fb3e4c61b6e937784a1775d389e934b71bff2c1b023a21
-
Filesize
896KB
MD51f2fc2c9865bd167c40ce2825213dcc2
SHA16a60bd697b81a177c74808ba564fd7ca71ccfdcd
SHA25664035e83834135d5213577245ecbac90e8c2eb9f2114f51d97c1435a92f6d479
SHA5128898f830b78f90c6d19301ba54b56b2f5af44657b7d4787a22c86b13372e009b8e56d15092c905b37c92cf646d03e6d98fd3a5557f487f5a35b07f688fd5aade
-
Filesize
1024KB
MD5ef3e3f4c385b31295b924e3469523474
SHA1b7d10b41784ab3c93fd060f6092161f824d5d801
SHA256e9ba4765433bd1997cf7d16dbc497d12d5c3eab4ab5df1edb1861ef6b982a815
SHA5120be687ecbb12b56c3ede22a357d62fbbe052485f7ded5cbab296cf8bf045c8aa919e6a0d7c136b0772835340d812aa28f91711cd91b4ae43c99c93efc6c7cfd6
-
Filesize
68KB
MD5870ac374c9cedc07c65a25f5aedfe589
SHA1518c610906fe889b5f02c49e462ffd5bedd086b0
SHA256d37156a4049992d2d2760125f7875fce21b6c409324ff26e70331ee8fa64e6c3
SHA51206a712b791e6fa53f8a83448cdf905b7abdddb35a15254f413345a8e826a336467d793f57c3dc196a80a37f2c32bd2c83743b6e4357c4d9e577a2661a1c40b44
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD504a6c2deed9e9765d58a551d97a4c344
SHA1c887308ac1fc393317cd64a8196b92999ee89a58
SHA256328667e816e4437fb0c24407eaec8ebf3329029550c74da9843f0b18b32af1e5
SHA5123dbc33518df23d6ab7d299a31793207e8b75bf702284b79758a89f6f505817e4942b0e7fe1e03069f9321f9109476fafff6d8366255e1685b72d9e7f2152ebe5