Analysis

  • max time kernel
    898s
  • max time network
    797s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    30-01-2025 22:39

General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    cc560bdc2869ccf4ae0e939a1aa7f1b4

  • SHA1

    f16b12272a26df1bb2dffe5ebbd8483b30d59ee5

  • SHA256

    88438e680d7127491c1bed3f762ac9fc7839e08e710cb8f9da9d1cfbaf772f68

  • SHA512

    d57d6e8e1d27d41c01f3a6c6bcdb8f522748527678539f816b94da3b5cba8a75a96b8d1b0677ef77925eb579d2c7d374f50b91df9887f734ff288a303ddbae12

  • SSDEEP

    1536:PUwC+xhUa9urgOBPRNvM4jEwzGi1dDxD8gS:PUmUa9urgObdGi1dNV

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Server.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:1792
    • C:\Users\Admin\AppData\Local\Temp\tmp517D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp517D.tmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3868
  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4356
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\TestInstall.dib"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3104
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:2220
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      896KB

      MD5

      ab3ef0e76533f3dd927c1dabaae6bef3

      SHA1

      5d70232250dca144994abadb37f03a8c71d62601

      SHA256

      e61cd9e7ad852ffe3a9bb39697134afdbbcf0496aa46526a89bf6f6b58efc28f

      SHA512

      46f7342c0e3f0ee12dd09389f6a507666ea78bea095fc09255acea3118cb5f11a604b722091c3ddfba45a945198e50a22256e831752dbee5922696f7a1c99de4

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      1024KB

      MD5

      b4b9b569d09a40e5847bb698cb9be1ae

      SHA1

      03c52aca33e9a21d5f499675cf8fb574602a9b0c

      SHA256

      7c5e6d5bab623964bc7ef53e387b1bb0e6f92bbbb8c9f838d397a7804c4ba796

      SHA512

      aaef8a5aae07b6567b78bdcf0815f7017858aff7f8bab795a619182383b2d3f741191fe940b01979bc611c5d4577c9e4e8d21809e3c7b48303a7857d27d6bc84

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

      Filesize

      68KB

      MD5

      3b9d462d1921edac4878d246582b7746

      SHA1

      1514adafd5ec1bd3d34535c18ce50ac4b03593b6

      SHA256

      c4e3e3de7ec07066ac97fe8ee196a20129e972e6e2e1142a9006a60555cd944d

      SHA512

      079b52d483a0301af40800c9bf8796502aac08dad76acf48588a978a26438f427df79d622fc5ba046f0ab96974e5b4da0a510badad43d76282e07768ec14e75f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

      Filesize

      498B

      MD5

      90be2701c8112bebc6bd58a7de19846e

      SHA1

      a95be407036982392e2e684fb9ff6602ecad6f1e

      SHA256

      644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

      SHA512

      d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\tmp517D.tmp.exe

      Filesize

      29KB

      MD5

      cc65ad514684506f9f22c71d94c537ea

      SHA1

      36e2bf3159d14552279fc1b80db80a8c177925f4

      SHA256

      d215b8cc095e913f2d3adbd88ae7691be657104dd52340efba670d04eff1e368

      SHA512

      5c505b4c49df8e7e83af47719f79018358a39f1df552b2b90dda244b1e41a30559cbe66b1d415a836f403452c5493b26e28ef170376eb5f1a310733e65d8eeed

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      320ac8ed29ab6a71901776828113e6e8

      SHA1

      4a5a4b2a46fcb5e11d0146db94b35b4c658cfff2

      SHA256

      3c4d9b6096814d05d351ab67cab4140b8632a2af5e0b930007801809c9964b11

      SHA512

      3d2a550728a62b8e168bdfc55c103abf7e8965ea6c616b798698f3bc5f5cbb38d998ff7b15da364d2d2ef5a2eaca9931f7a5602cc97446c013dff94e201acb9b

    • memory/2240-116-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-115-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-117-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-118-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-106-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-107-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-108-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-114-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-113-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2240-112-0x000001E58C280000-0x000001E58C281000-memory.dmp

      Filesize

      4KB

    • memory/2808-63-0x0000000007470000-0x0000000007480000-memory.dmp

      Filesize

      64KB

    • memory/2808-91-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-139-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-64-0x0000000007470000-0x0000000007480000-memory.dmp

      Filesize

      64KB

    • memory/2808-141-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-66-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-67-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-69-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-70-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-68-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-71-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-73-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-72-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-83-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-76-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-74-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-77-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-82-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-80-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-81-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-79-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-78-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-145-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-75-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-136-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-144-0x0000000007470000-0x0000000007480000-memory.dmp

      Filesize

      64KB

    • memory/2808-140-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-146-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-137-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-87-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-88-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-142-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-89-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-90-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-138-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-131-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-132-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-133-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-134-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-135-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-143-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-130-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-129-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-128-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-126-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-84-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-119-0x0000000007470000-0x0000000007480000-memory.dmp

      Filesize

      64KB

    • memory/2808-120-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-121-0x00000000070D0000-0x00000000070E0000-memory.dmp

      Filesize

      64KB

    • memory/2808-123-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-122-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-125-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-124-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/2808-127-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB

    • memory/3404-0-0x0000000075252000-0x0000000075253000-memory.dmp

      Filesize

      4KB

    • memory/3404-1-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-2-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-5-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-4-0x0000000075252000-0x0000000075253000-memory.dmp

      Filesize

      4KB

    • memory/3404-6-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-7-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-8-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-9-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3404-10-0x0000000075250000-0x0000000075801000-memory.dmp

      Filesize

      5.7MB

    • memory/3868-32-0x0000000071860000-0x0000000072011000-memory.dmp

      Filesize

      7.7MB

    • memory/3868-92-0x0000000071860000-0x0000000072011000-memory.dmp

      Filesize

      7.7MB

    • memory/3868-86-0x000000007186E000-0x000000007186F000-memory.dmp

      Filesize

      4KB

    • memory/3868-31-0x00000000057C0000-0x0000000005816000-memory.dmp

      Filesize

      344KB

    • memory/3868-30-0x0000000005650000-0x000000000565A000-memory.dmp

      Filesize

      40KB

    • memory/3868-29-0x00000000056C0000-0x0000000005752000-memory.dmp

      Filesize

      584KB

    • memory/3868-28-0x0000000005BD0000-0x0000000006176000-memory.dmp

      Filesize

      5.6MB

    • memory/3868-27-0x0000000005580000-0x000000000561C000-memory.dmp

      Filesize

      624KB

    • memory/3868-26-0x0000000000D30000-0x0000000000D3E000-memory.dmp

      Filesize

      56KB

    • memory/3868-25-0x000000007186E000-0x000000007186F000-memory.dmp

      Filesize

      4KB