Overview
overview
10Static
static
1Pixel Firm...x).zip
windows11-21h2-x64
10029eba5f69...68.png
windows11-21h2-x64
26b7543091...59.png
windows11-21h2-x64
2e6c645f2e...4a.svg
windows11-21h2-x64
139c3553c73...85.svg
windows11-21h2-x64
13ae121120d...20.wav
windows11-21h2-x64
6441d10a288...08.svg
windows11-21h2-x64
16474b710d5...b0.svg
windows11-21h2-x64
16ed6d8a8e3...bf.png
windows11-21h2-x64
747c1b576f...b9.png
windows11-21h2-x64
83a9787d4c...67.wav
windows11-21h2-x64
683c36d806d...ff.wav
windows11-21h2-x64
69d89e27da9...1f.png
windows11-21h2-x64
a1892a9c76...8e.png
windows11-21h2-x64
a1f941cd04...29.png
windows11-21h2-x64
b61b1077b0...ff.png
windows11-21h2-x64
b7affffe5a...cf.svg
windows11-21h2-x64
1be386d4600...2b.png
windows11-21h2-x64
c0787d4875...6f.wav
windows11-21h2-x64
6d9a7d9c3ed...71.svg
windows11-21h2-x64
1e71ee248e3...55.png
windows11-21h2-x64
e73f69c960...03.wav
windows11-21h2-x64
6f32620d2f2...79.svg
windows11-21h2-x64
1project.json
windows11-21h2-x64
3Analysis
-
max time kernel
872s -
max time network
443s -
platform
windows11-21h2_x64 -
resource
win11-20241007-de -
resource tags
arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows -
submitted
07-02-2025 07:15
Static task
static1
Behavioral task
behavioral1
Sample
Pixel Firm (Pixel Shop Remix).zip
Resource
win11-20241023-de
Behavioral task
behavioral2
Sample
029eba5f696a79d7afe64c7c33e25468.png
Resource
win11-20241007-de
Behavioral task
behavioral3
Sample
26b75430914f6470d475161f1d412359.png
Resource
win11-20241007-de
Behavioral task
behavioral4
Sample
2e6c645f2ef2d4fad4bfa6bc7b9f4c4a.svg
Resource
win11-20241007-de
Behavioral task
behavioral5
Sample
39c3553c73f984144931c1576e3e0085.svg
Resource
win11-20241007-de
Behavioral task
behavioral6
Sample
3ae121120dedf903a043b7a040049620.wav
Resource
win11-20241007-de
Behavioral task
behavioral7
Sample
441d10a288265ee57f3b707c3bdfda08.svg
Resource
win11-20241023-de
Behavioral task
behavioral8
Sample
6474b710d50120b4d906b2645f1328b0.svg
Resource
win11-20241007-de
Behavioral task
behavioral9
Sample
6ed6d8a8e3d96ccf6f4e75d2848d29bf.png
Resource
win11-20241007-de
Behavioral task
behavioral10
Sample
747c1b576f350df4cfd6cc07055cd4b9.png
Resource
win11-20241007-de
Behavioral task
behavioral11
Sample
83a9787d4cb6f3b7632b4ddfebf74367.wav
Resource
win11-20241007-de
Behavioral task
behavioral12
Sample
83c36d806dc92327b9e7049a565c6bff.wav
Resource
win11-20241007-de
Behavioral task
behavioral13
Sample
9d89e27da905e4ce9c76b66f0a905c1f.png
Resource
win11-20241007-de
Behavioral task
behavioral14
Sample
a1892a9c76790b7be4707add30384d8e.png
Resource
win11-20241007-de
Behavioral task
behavioral15
Sample
a1f941cd04924aff380ef6f30ee42829.png
Resource
win11-20241007-de
Behavioral task
behavioral16
Sample
b61b1077b0ea1931abee9dbbfa7903ff.png
Resource
win11-20241007-de
Behavioral task
behavioral17
Sample
b7affffe5a4f8d94c45570fbf2cdd5cf.svg
Resource
win11-20241007-de
Behavioral task
behavioral18
Sample
be386d46002a638111d8926ac561c82b.png
Resource
win11-20241007-de
Behavioral task
behavioral19
Sample
c0787d4875aac1ae138e43cb9b086d6f.wav
Resource
win11-20241007-de
Behavioral task
behavioral20
Sample
d9a7d9c3ed551e7c59e40355d2d4bb71.svg
Resource
win11-20241007-de
Behavioral task
behavioral21
Sample
e71ee248e312e7594ba9ff2e43147455.png
Resource
win11-20241007-de
Behavioral task
behavioral22
Sample
e73f69c9601eb421eb5d85dcb9217f03.wav
Resource
win11-20241007-de
Behavioral task
behavioral23
Sample
f32620d2f215d5b6648be028be4cc079.svg
Resource
win11-20241007-de
Behavioral task
behavioral24
Sample
project.json
Resource
win11-20241007-de
General
-
Target
c0787d4875aac1ae138e43cb9b086d6f.wav
-
Size
1KB
-
MD5
c0787d4875aac1ae138e43cb9b086d6f
-
SHA1
0057aec829f7ae50065c22c94cd5f09f0ee5be53
-
SHA256
adccd6120ba4e49441ca61d64fffee59054f15982d06d96231c4fca0a0bdd1a3
-
SHA512
0da461cd3227f2c361663dd1970f525d113cf3fa380d9547c80fc6f5689dfb7b9f8779a1aecafd939fe26edbd1f761a51a5a2f98ccdc9468e43adfd0e4e22cf1
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2584844841-1405471295-1760131749-1000\{56C905AE-B948-496C-836C-274BA14D26E7} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3396 wmplayer.exe Token: SeCreatePagefilePrivilege 3396 wmplayer.exe Token: SeShutdownPrivilege 1028 unregmp2.exe Token: SeCreatePagefilePrivilege 1028 unregmp2.exe Token: 33 3172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3172 AUDIODG.EXE Token: SeShutdownPrivilege 3396 wmplayer.exe Token: SeCreatePagefilePrivilege 3396 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3396 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2888 3396 wmplayer.exe 77 PID 3396 wrote to memory of 2888 3396 wmplayer.exe 77 PID 3396 wrote to memory of 2888 3396 wmplayer.exe 77 PID 2888 wrote to memory of 1028 2888 unregmp2.exe 78 PID 2888 wrote to memory of 1028 2888 unregmp2.exe 78
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\c0787d4875aac1ae138e43cb9b086d6f.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3704
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5db7afd24ce0329d6857a3a9e0d1d1849
SHA1dd1b34b769f6259e8f4d2506d618a1c8d0440b8b
SHA2563615a8443ca29f326161ac9a3c539c3f4e92d4d4c133d7b80fc1282ed57d6334
SHA512e99fa0f35954757143fccdff3d27b441006f34bb118e08975d2354a8f420bd15af5e81d9068d32df03446b1557140b09b36203f61ae20fe7fb155f819b5a7661
-
Filesize
1024KB
MD5b20251f4fee958772acb4eed8a9c222d
SHA1daea398d0d6b195d5bb1d3cdb4537b925e21f7f4
SHA2560c93ceca07bfb5b17eb117dfb0c228b367b7cd4a8504b90f179777081e9c01c4
SHA5128b7d5f35ae66fcd01af303b4140c84f6cd88ff1322f3a412d55fc3958e942da61587a92c6929f35a722046810915855d0639ea3fa7ee92f49e9b721447457631
-
Filesize
68KB
MD507e5ad4db1155a3bb8f2f4844152b141
SHA157518d5c279cac9b5c1bc0b0a5a0e169e6322a2b
SHA2566b904e2f75944a52ac0c27a00f24f15aa0e7971b1b399c4e97218181da905205
SHA512bfe2917c705396cb31cb12255a39d4a6b0571aefbe4db6cda160ee8f38099b92eebbf14d9b0129b24831f7cffd14ff02e481234c6daba135b6ca8b51412d3aed
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5471ea7b7e493b33419efedb22dba9a0a
SHA1681b8a2a0c06f13ccd2e509e9b6d63384a61c443
SHA256dcee1e0056b1d84f8993be5dc7de43ac1788ba1467342527dd963144cc5e4d71
SHA512e270718a4f4a157445833c4f68afddef987294e62f92ab6bfa8e2ec4d2820d22f39ae5190d8eb5d259e4a4df7878565c55625bd5fd82c06d2e38a26cea990bab