Analysis
-
max time kernel
123s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
Σπουδάζω Εργοθεραπεία!.mp4
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Σπουδάζω Εργοθεραπεία!.mp4
Resource
win10v2004-20241007-en
General
-
Target
Σπουδάζω Εργοθεραπεία!.mp4
-
Size
5.1MB
-
MD5
1f1f45d56195e14382ed52303e96b16f
-
SHA1
bedeea8cd5948702e23da520a1dad4de618759ae
-
SHA256
881bf1bf5880f7ff149fba3edf48efbd35935ad977b86a2a40974765903ab272
-
SHA512
e4429bca6a47a1d44797dd20103de1bcb27018064704232c5f4738c957c9475dfc570d0859738aa7a1c10f061c4c99add050d58048fe2fc806f83d7de3613a1d
-
SSDEEP
98304:WoHjWilp00rfyxZVwbcs+d0NSlGjt7UGepGa:WoDWs08f6Zu7+d4RhUGepGa
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
Processes:
wmplayer.exedescription ioc process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
unregmp2.exewmplayer.exedescription ioc process File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe -
Drops file in Windows directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmplayer.exeunregmp2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
Processes:
wmplayer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{7867CE79-27EE-4E4C-AE0A-F0103212E783} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
unregmp2.exewmplayer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 4160 unregmp2.exe Token: SeCreatePagefilePrivilege 4160 unregmp2.exe Token: SeShutdownPrivilege 3124 wmplayer.exe Token: SeCreatePagefilePrivilege 3124 wmplayer.exe Token: 33 1712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1712 AUDIODG.EXE Token: SeShutdownPrivilege 3124 wmplayer.exe Token: SeCreatePagefilePrivilege 3124 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
wmplayer.exepid process 3124 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
wmplayer.exeunregmp2.exedescription pid process target process PID 3124 wrote to memory of 4504 3124 wmplayer.exe unregmp2.exe PID 3124 wrote to memory of 4504 3124 wmplayer.exe unregmp2.exe PID 3124 wrote to memory of 4504 3124 wmplayer.exe unregmp2.exe PID 4504 wrote to memory of 4160 4504 unregmp2.exe unregmp2.exe PID 4504 wrote to memory of 4160 4504 unregmp2.exe unregmp2.exe
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Σπουδάζω Εργοθεραπεία!.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1392
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x528 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD5ed6403a9e04010f1dec738de07aa712e
SHA11c106b90e799899f7b7d87430272720f05a47b2f
SHA25665ac91d9fa770fe2025fa0866dcdbad3a33087f3aa7974150ad0d6d0c2b87432
SHA5121ac9e6c73f062b10b5af5abf4131827ef347ecaf2295168d2f0ff92a03513a97634a2dcc0dbad40cd4427446fc76673749bbea4988eade919608d174117654b4
-
Filesize
1024KB
MD5e115fed2024dfb1334d5f6132cce3bb0
SHA152c1e40e24764a2070cde2087e2c350df86018bb
SHA25639437acb4aa5a872a492f0c23822d868cba1a6a05681bcd70ecaee66438f036e
SHA5125837e8f9167c1cf9012faaeb770ef812a7c3329c42c309c9f608979ef71fcb23795165f43ceac2f9ea589c404034e146cefc5f810973fc346316de5b220b2f71
-
Filesize
68KB
MD56aaa9c2cd5dcc649debe2279a7f56e6e
SHA18db9ee2a210828b5fbc4c2e5bf6e9312b3df2676
SHA256ce7fb1b372642cafcc1ad716210f82635db7c0d0454935f99e4cae7a2e7958d8
SHA5123d36f78c6415526affbcc3f96b21e9efb181e6217d558db730c447386adfe593d3ebc933b41ce19670fdeeb1d62d936b8bf2d7843a38db4d7b336261bb5cc3be
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD573102c34ef1098572ec14e6415eb94eb
SHA138dbe598987b457bd26e8e4c4eefb70db51adf1b
SHA256c5f9e95e24cd003094680de0a293f4237e3e7d195ec053b6cc97e56578e8ff2a
SHA512963596afd9d3844fc83f3e93f406e21c2562012e14b75c2a8d332e5e79aff98782d179f568bb15c568fa72888d1d81ef371ef83b348848c04a904ddb80896a97