2021-12-06 18:13:24 +01:00
---
Name : Unregmp2.exe
Description : Microsoft Windows Media Player Setup Utility
Author : 'Wade Hickey'
Created : 2021-12-06
Commands :
- Command : rmdir %temp%\lolbin /s /q 2>nul & mkdir "%temp%\lolbin\Windows Media Player" & copy C:\Windows\System32\calc.exe "%temp%\lolbin\Windows Media Player\wmpnscfg.exe" >nul && cmd /V /C "set "ProgramW6432=%temp%\lolbin" && unregmp2.exe /HideWMP"
Description : Allows an attacker to copy a target binary to a controlled directory and modify the 'ProgramW6432' environment variable to point to that controlled directory, then execute 'unregmp2.exe' with argument '/HideWMP' which will spawn a process at the hijacked path '%ProgramW6432%\wmpnscfg.exe'.
Usecase : Proxy execution of binary
Category : Execute
Privileges : User
MitreID : T1202
OperatingSystem : Windows 10
Full_Path :
- Path : C:\Windows\System32\unregmp2.exe
- Path : C:\Windows\SysWOW64\unregmp2.exe
Detection :
2022-12-29 15:51:15 +01:00
- Sigma : https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_unregmp2.yml
2021-12-06 18:13:24 +01:00
- IOC : Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP`
Resources :
- Link : https://twitter.com/notwhickey/status/1466588365336293385
Acknowledgement :
- Person : Wade Hickey
Handle : '@notwhickey'