Analysis
-
max time kernel
1172s -
max time network
1148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
3bnwbl3TR0BzBzyo.mp4
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bnwbl3TR0BzBzyo.mp4
Resource
win10v2004-20241007-en
General
-
Target
3bnwbl3TR0BzBzyo.mp4
-
Size
472KB
-
MD5
ff2d8be9b13e4113ba5e1fb1bf83442a
-
SHA1
59037f075c02e2cfac6235b552d04e84f77b36f0
-
SHA256
832cecf089ae033c4167d8fae2b13abe0ca2d8c29b6c599d8c1b008a226371a2
-
SHA512
804bb0c1c8871cf3f9c66dae9ad561adb4ced95b567e44a2874bac847e871deab7c6471aa4806361a9e1395b70ca0affa3a49248c22b017651cec7b7f7cfa593
-
SSDEEP
12288:ap5awlAXrB7IvbkmCOg/5lXwaZEy5mvtcsBIlMj9rp:apYgjkmCXAaZEumvluI9d
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3350944739-639801879-157714471-1000\{39020873-F977-4C69-9F32-A368284ED4E5} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4060 unregmp2.exe Token: SeCreatePagefilePrivilege 4060 unregmp2.exe Token: SeShutdownPrivilege 2828 wmplayer.exe Token: SeCreatePagefilePrivilege 2828 wmplayer.exe Token: 33 4656 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4656 AUDIODG.EXE Token: SeShutdownPrivilege 2828 wmplayer.exe Token: SeCreatePagefilePrivilege 2828 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2408 2828 wmplayer.exe 84 PID 2828 wrote to memory of 2408 2828 wmplayer.exe 84 PID 2828 wrote to memory of 2408 2828 wmplayer.exe 84 PID 2408 wrote to memory of 4060 2408 unregmp2.exe 85 PID 2408 wrote to memory of 4060 2408 unregmp2.exe 85
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\3bnwbl3TR0BzBzyo.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x420 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD51fae29578faf2a8fb888ca2f0a8399ee
SHA1d6acdea01fb654636727108dac103bfa11d1102e
SHA2562528f14e97c97d72bf94e63318bd07f3c22a4e27d0e2df8aa9881a9bd113de5a
SHA5125f3f4a73be2f680bcec630a42229f81fb5ad2d90a20e388eca8ef12230a35d8319ae4e1baddeb47540ad3ce4d2dbed3f8a970a3ee2a523a5731280319285875b
-
Filesize
68KB
MD55f81ed7ceb4e932202639161f361fa79
SHA117bd1b46bfd86da4daf6730d1e43b740df64c9ce
SHA2567fea3462af0caf250e9fe8ba79b5180f3f0bd785dd1e5df8eabe621b15c734df
SHA512c0b71e0e61050ec04353246c44c00da094ecce60f2a963fcac4e2d30b202eca2fb39a52a986eb022878fc8a94393349791367c0b0a250118194303b9bbd63ff2
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5002210aa2bf34ac1a5ac5de8801f25d6
SHA1057d89cf0c8a557bbf9886060b952f883bf7d92e
SHA25637e63c4f8402e1f3e873f2ec450f72fbed3e92a882181f2e8b96612bdef5e6c0
SHA512d02691250b7880ea11140ee356b19990d37852c8220cd9c05f770ca808f5d8b0ac8e9e71293b7da121164ea42b319c9cd29c653eb66de17417d1318d9357b51f