Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 08:42

General

  • Target

    singl6.mp4

  • Size

    318KB

  • MD5

    7449f0b436d00af0480c1b5ae0f02522

  • SHA1

    30b18eb4082b8842fea862c2860255edafc838ab

  • SHA256

    0df59ced4eb33e4729d11d315a0fd1b738710169d91a3ebcf1eab2fd64abd41d

  • SHA512

    4d80d1d8964a719d83faad5f5a27b6af3d1fdb35555aef9c0697cd7301418e038cf8c5ddebd657b5cd4644760c41d3f97e40bf3f4629ff8bbe1105487c0baf67

  • SSDEEP

    3072:3Xp62DPuQbB1xpRVtLClSE3bZtLwxZgqVVey:3XbWQbtpE0YoL

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\singl6.mp4"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4052
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:3900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    384KB

    MD5

    063793e4ba784832026ec8bc3528f7f1

    SHA1

    687d03823d7ab8954826f753a645426cff3c5db4

    SHA256

    cb153cb703aea1ba1afe2614cffb086fa781646a285c5ac37354ee933a29cedd

    SHA512

    225910c24052dfdf7fca574b12ecef4eb68e990167010f80d7136f03ac6e7faa33233685cbf37b38ee626bb22ff3afeee39e597080e429be3ec241fb30af40c6

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    9d7f20b97f38f29d48e849e9b1b17700

    SHA1

    eb5b531f69baa8aaa30f8c788ef33de3b8b60c3e

    SHA256

    29085dba7c0246345a1805f48c539047e9e75ff0bc8f9c25eede1bdee88bc4bd

    SHA512

    cb45c9cef6dbfd730bfb072689509f668dc430a1d3dfdd520356b2dff4d5fec94a02e9f6ac7d3839fa35aeea5f86188d400aba3e0c8f7155b90ba4a0cb50feb6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    2cabd41e6eeb9a568654ad90bc2b2acd

    SHA1

    e24a94f85c39fbd4ac2e6fb538a96a031b56d2a5

    SHA256

    df84d906e3626160804e8e356aa3199b6a376d8b3367da5d66a0e9e5bae750e3

    SHA512

    5e23de01fc316719f45fe4cb52c45388a8b830fd5a1f387956735fff6f500235aa045dda55d2885aece509614116d113a9d5ebecdc004d967813c2943f82c5bf

  • memory/3744-35-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-34-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-39-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-38-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-37-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-41-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-40-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-36-0x0000000009850000-0x0000000009860000-memory.dmp

    Filesize

    64KB

  • memory/3744-33-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB