Analysis
-
max time kernel
110s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
51B4EF5DC9D26B7A26E214CEE90598631E2EAA67.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
E906FA3D51E86A61741B3499145A114E9BFB7C56.exe
Resource
win10v2004-20250314-en
General
-
Target
E906FA3D51E86A61741B3499145A114E9BFB7C56.exe
-
Size
261KB
-
MD5
6d3d62a4cff19b4f2cc7ce9027c33be8
-
SHA1
e906fa3d51e86a61741b3499145a114e9bfb7c56
-
SHA256
afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18
-
SHA512
973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad
-
SSDEEP
6144:93g0BQG+aZiycigV5bbEo6dZbBODPIsjQ/UFsYWo:93g0OGjZiycigVRbObBODTMUdj
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E906FA3D51E86A61741B3499145A114E9BFB7C56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4040 unregmp2.exe Token: SeCreatePagefilePrivilege 4040 unregmp2.exe Token: SeShutdownPrivilege 3620 wmplayer.exe Token: SeCreatePagefilePrivilege 3620 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3620 wmplayer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2260 2460 E906FA3D51E86A61741B3499145A114E9BFB7C56.exe 86 PID 2460 wrote to memory of 2260 2460 E906FA3D51E86A61741B3499145A114E9BFB7C56.exe 86 PID 2460 wrote to memory of 2260 2460 E906FA3D51E86A61741B3499145A114E9BFB7C56.exe 86 PID 3620 wrote to memory of 2276 3620 wmplayer.exe 110 PID 3620 wrote to memory of 2276 3620 wmplayer.exe 110 PID 3620 wrote to memory of 2276 3620 wmplayer.exe 110 PID 2276 wrote to memory of 4040 2276 unregmp2.exe 111 PID 2276 wrote to memory of 4040 2276 unregmp2.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe"C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exeC:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe2⤵PID:2260
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD57ef6a69be7cc187e88c5f4c12a7012db
SHA1feaeed0bf3b3daa62806ed0ee165bb2db4019afe
SHA256e085e9d51059f6c0b2454271365e41a9bddd93278814183102b377cc5de2465a
SHA51263600409b7f91109439f130cbabe1cb7e7dc57e57d5bdc07caf63017a6c517b4a55406825170d0b3c2c3972975afa88d3a9f5ba8f7969b6a1b96a8326f2fa4ef
-
Filesize
1024KB
MD5ccf67014f5d82e848b8fdb16c874f205
SHA1f99aae7e3ea1e9cbfc23a57cbf7c67b58a73361c
SHA256551ffeb28849c5b0b548c7d6371193912e72fb890d783130080c4b65ebaa6514
SHA51228112605f662fdf54a404a316f5fd7c90b7cf8a602df15061051ee7b3983f507075c2a3b6df563dc5ef682671e310c8597f1009c4cd67124fe086e502ad56012
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD599ea9d311c3776322c08462863f82f64
SHA14c567c13c497e87e5bd1ec91320f8b7ec2218a2d
SHA25677aac0d49e71aaedd62805737c4e76d39544aca3cc92f07be3d4552f9cdbd6d6
SHA51236c2f51d08f7a5c07c980fc967abff37ffcbb2b5a7e5936c8a4ae1f473f5a099f0a4bdf739f70fd36ed88b3690f794e72b74a8139d8d346c487e54ddad5ed8c4