Analysis
-
max time kernel
203s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-it -
resource tags
arch:x64arch:x86image:win10v2004-20241007-itlocale:it-itos:windows10-2004-x64systemwindows -
submitted
17-12-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
singl6.mp4
Resource
win10v2004-20241007-it
General
-
Target
singl6.mp4
-
Size
318KB
-
MD5
7449f0b436d00af0480c1b5ae0f02522
-
SHA1
30b18eb4082b8842fea862c2860255edafc838ab
-
SHA256
0df59ced4eb33e4729d11d315a0fd1b738710169d91a3ebcf1eab2fd64abd41d
-
SHA512
4d80d1d8964a719d83faad5f5a27b6af3d1fdb35555aef9c0697cd7301418e038cf8c5ddebd657b5cd4644760c41d3f97e40bf3f4629ff8bbe1105487c0baf67
-
SSDEEP
3072:3Xp62DPuQbB1xpRVtLClSE3bZtLwxZgqVVey:3XbWQbtpE0YoL
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1540 2876 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5044 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4320 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4320 vlc.exe 4836 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 5076 unregmp2.exe Token: SeCreatePagefilePrivilege 5076 unregmp2.exe Token: SeShutdownPrivilege 2876 wmplayer.exe Token: SeCreatePagefilePrivilege 2876 wmplayer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2876 wmplayer.exe 2876 wmplayer.exe 4320 vlc.exe 4320 vlc.exe 4320 vlc.exe 4320 vlc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4320 vlc.exe 4320 vlc.exe 4320 vlc.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 4320 vlc.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 4836 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2236 2876 wmplayer.exe 83 PID 2876 wrote to memory of 2236 2876 wmplayer.exe 83 PID 2876 wrote to memory of 2236 2876 wmplayer.exe 83 PID 2236 wrote to memory of 5076 2236 unregmp2.exe 84 PID 2236 wrote to memory of 5076 2236 unregmp2.exe 84 PID 4836 wrote to memory of 5044 4836 OpenWith.exe 114 PID 4836 wrote to memory of 5044 4836 OpenWith.exe 114
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\singl6.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 23322⤵
- Program crash
PID:1540
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1892
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2876 -ip 28761⤵PID:5008
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\singl6.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4320
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\singl6.mp42⤵
- Opens file in notepad (likely ransom note)
PID:5044
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD510251ab586bff990cfc951d502199a74
SHA13c0055fed58f05c4c2bd42abc33946b816a58b31
SHA2566f9718b17cb4f7f00e482a87c9f45d1e4f55d587f7179e16dd426c233c9048a5
SHA5125222847d800ea93629d18b9050a97529556c1849bf8bb2be55481e0547fa42d113d0afef49aeb154b458ed883bfd6502566b1abb69193806737ff3ad2728614f
-
Filesize
1024KB
MD5a4170d0c025f3822f1a35aa19c64c030
SHA197d846ea1137ce9fe20aca61d93a1fb89cefa4f1
SHA256ed7382fc2c72a30615feca207925b932cdb035acb73501e374a8c59e6523c2ce
SHA512ee0080097a4bdedfccc4c005125dbb2b2267e56d89f9da5d7487edb3545e83f2410e3d8152ecbe3492faf465229af28d0ecccd6664556cc262f5f2e79b16e742
-
Filesize
68KB
MD54d4efe10d417e2ef19054c530abec90b
SHA1f5f5495ca16e386e01f6c6076fbdcbeb282ee090
SHA256245fbd23c2bfdd5037d9988d9d7a8adc4e85e136282ca4787dcf386c4cd17138
SHA512cccba66a13a320b3d9bc5a379e712fae77a0a7f766570624e93d3d72c4449f9329a51667b638657540962a7b2c57243b65b25dcf81621e91efe9c070d1014bfb
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5ae5fc4f2913d6229021633df76dfd505
SHA14c53172d39f78a6cf2a375b3dd24202e6b6957ab
SHA256f99e78e567896148d99b63fe41a859de9564b2d30a53493a6ec9f133172f05e9
SHA512e7cbfa5b3857de83117072127cfc7db0449a5f2ec0afb447b99c1c63f6632b0fe851a1b1a045bcd6f4e2ed7c018457445bc2ba66d15ad7296d22c317e0d73bd9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5a5fcb3c595ba82a3b0aba68e920f7ac0
SHA178fdc875ec78fed2a03a4ff9aadee3e8d565ff26
SHA256e6e7485a0c0ba0244492f76590bfb6bd031b2d73cb442f50ffeace63536276a0
SHA512d25dbc361d40dc017204d754eb8a1e2474a496d824ab42df94ec4e01e96dabecdb70eaaf4a922698a1e3b977a47fed5983c0fe504b75b558106a7a55f7491d28
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD53394a12f4a786a8c95eff8c633b61007
SHA1edc43d17e9f45dcc54b6fead42c0a49526cefd84
SHA25684700a1beb8adbef99634cf0961b88b97d78b31750dc809d8666cf42973f0f05
SHA5129b2f20057e221b2b1267382a68f7a8022ef81d34e21cf43cee8a888ce1e199afa10369c7c91b8e85d38be3c7e61a36c3612658234701b1356c829f103e0342cc