Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18/01/2025, 18:00
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
Server.exe
-
Size
37KB
-
MD5
a404f1c74d62aa8505286bac745f65e8
-
SHA1
583ec4674c5025734afc2e9f1981222797ea94d2
-
SHA256
6fc5cf3fc04fa48f0052d3725ce6cc0b75a7d61e26bef113ee92b07c1dabc333
-
SHA512
b6614f28ad19f3ebc68cba5da50cf7b30d5676798fca15ee8a112741adcf5c950ef5aa0f4ee17d2783d9f044cfdccc41988b1a6ece3f20073644b953929f835f
-
SSDEEP
384:d36Nb7LsikZ9zNf/1uyU71evdjsOaP4rAF+rMRTyN/0L+EcoinblneHQM3epzXhb:ENf4l1lU71e9FagrM+rMRa8Nu+6t
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2060 netsh.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4072 2908 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: SeShutdownPrivilege 2908 wmplayer.exe Token: SeCreatePagefilePrivilege 2908 wmplayer.exe Token: SeShutdownPrivilege 1648 unregmp2.exe Token: SeCreatePagefilePrivilege 1648 unregmp2.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe Token: 33 1680 Server.exe Token: SeIncBasePriorityPrivilege 1680 Server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 wmplayer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2060 1680 Server.exe 81 PID 1680 wrote to memory of 2060 1680 Server.exe 81 PID 1680 wrote to memory of 2060 1680 Server.exe 81 PID 2908 wrote to memory of 2868 2908 wmplayer.exe 87 PID 2908 wrote to memory of 2868 2908 wmplayer.exe 87 PID 2908 wrote to memory of 2868 2908 wmplayer.exe 87 PID 2868 wrote to memory of 1648 2868 unregmp2.exe 88 PID 2868 wrote to memory of 1648 2868 unregmp2.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 31002⤵
- Program crash
PID:4072
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2908 -ip 29081⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD5fbda2b1e91de816f77a25e4512d0d601
SHA1e14dc39cab38191b79f452d03fd61111779e288a
SHA2563279c9c7d91b426b0f884c0feb88ce9d0f80912b704bb872c498391e746d3421
SHA512c2c4d196171a76009aea0f0de095e92b7f0073f527e2727005c80d824a16dd17bfa6c4a691546bc9ef383409a81fbffcba4e1196c60445bb40499d19a2653d9e
-
Filesize
68KB
MD5f2a09dc6ac1ca7b8d6f0c31301c30345
SHA1a6de88af27adfb53ba1c7b7eb9f9348f5be45fde
SHA2566226f680c65cfedf3c17248a0d46540320e56f4489a79fbbea6a928466e2f87f
SHA5120a4b0257bc289b89291dbc35240cc0bb5463ebde4f53877cd4feed766a56e5be4f6af89523337c8159e750664dfe0379c77d236a79a9b1c1569e817d62570551
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD51e7b87421b2ec4a6ee37e6ce2605c8c8
SHA129f51bc2c6df87ca6408ad430c724b309ad178d8
SHA256e971385e9971a40ce28bc65152056018594cb0a30e0032c9223c949a6380579e
SHA5120e2ae0b55f2a6a259aae5c7cda252527a9a6277ee31d730350a85f5d9cb08e16d4e42368cd866c2e5607a510d48540c7c15e4f659579b093ed67263a7d01cbdd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD555ce07b08d6a97c683564fc921662147
SHA1bd43e7059a9537487e0f1a8d638441fcd3da6827
SHA256b3b7f10a470fe31c11ba4c6f58f969062019f92e543fa291c750df2780b58672
SHA5123d6e9a617f17cb013a23f91711a8be83f984ec75134c5a112819e698b76138b2a77d5fa552494acfa86a4605f574199c659c9410fc150836991c97d9f47e8e06
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD5c10b3f64bce0e158bf0beec3bb2113f1
SHA1af606b6c1e142bd3f64324e00e959e68d695d839
SHA2569facbe46df4f5febc81554779fb11c401e0662eb4d33657df1f30bf587fdcbc7
SHA51206d8beb45307b07056d99d57d78e78d9b950f5f7844b4e71286a0dd760c67b228f7ed6c9f48a09a00d8ca698654ebba033260cf661420547ea6049110d3bdb64