Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/08/2023, 13:21

General

  • Target

    Setting File/Operating Video/Knob setting.mp4

  • Size

    879KB

  • MD5

    0788c710b079c54d0b10ef1835503ce1

  • SHA1

    8497ee48f1faa80fc4f0ac2eeb6a1076c796bfca

  • SHA256

    81991d424d2688f7e1faae0a213103f2690c3d9c43b9f9534536a21bb158da75

  • SHA512

    a665387d02510ded35b58bdc01f0202946053fdb05a291cac760426e8fad1b02890329cce273380aa939551ff25dce92a1e290ac615545bf7f5ab9939b101d48

  • SSDEEP

    24576:/39+Ye7PqvB9VLwhNGvIBuv1I/ZarP2cI6F:f0Y6Pq59p4NqfIk72cI6F

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Setting File\Operating Video\Knob setting.mp4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Setting File\Operating Video\Knob setting.mp4"
      2⤵
        PID:2524
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      256KB

      MD5

      2936527c6171be1065c6012a3e8ffddd

      SHA1

      9273557d3cfc6987eac30802569e9d2579d7d4a4

      SHA256

      e341ab7fd265205d2477cb5234a6c3d35911d7ebb17139b585b55eb7def237e0

      SHA512

      a83203b4696232299c70ff0f7ae292964417b0636d278544fd252a41e6ab3b5c749e836d83d7b22bc52d56dc069bb8caa0ebf5634b32e3acae7afc87c1215e5d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      b2fa124b4fdbfd53e7bb7610bc1b5839

      SHA1

      b1dd5c197337838478d941c108767804f21d56ce

      SHA256

      d6141099d60be10db87eef32415b98687da0b8fb8d8c42c72bb893c336de4cb1

      SHA512

      fb9fc164224a51cb63c9656a8340cd68cb778df1c83c478def35b9bced3cfb922b0c1fdff8bace5fc9c753b502334fad2a6abf02de074e1829f442cc79a7e098