Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 00:31

General

  • Target

    0e1ade0a-ead5-4969-a9bc-043d7cf7b0e2.wav

  • Size

    301KB

  • MD5

    83c4a754a364c039e4c2dfd9231a8636

  • SHA1

    cca2512cd2fe861c32819bbbbadc79b408554818

  • SHA256

    0f16b107e5b0e328f7c9b0ba72516e52df4933040a2e0a7d4ca097df9e6389fc

  • SHA512

    d6c9eb0461900e6421ec946f69e0ac4c479f80af19e8796c006150c14660d8062470ffd9419b34f86ca2016ab7a1bb5a7320e728c877bf6f9f3f6f7c250b3a86

  • SSDEEP

    6144:zHTZyzEV9+BhcpZqTrxcmx8go6aPcDEHe5yFfn+fOL4nJ6p7/tAVdXOYxhhd6lHf:zHgzE9+Bh6Zm7x8bPP514G42/t1CvdsX

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\0e1ade0a-ead5-4969-a9bc-043d7cf7b0e2.wav"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\0e1ade0a-ead5-4969-a9bc-043d7cf7b0e2.wav"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3112
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:1020
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Open "C:\Users\Admin\AppData\Local\Temp\0e1ade0a-ead5-4969-a9bc-043d7cf7b0e2.wav"
        3⤵
        • Modifies registry class
        PID:1752
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4472
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4ac 0x2f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    256KB

    MD5

    41e020ee798eceb4ac90cba2142a7a1b

    SHA1

    714ffdf4ddc441ae72c3fb2e4548a8219ad06fb8

    SHA256

    60968b6f285adc7f7347c43815c17a27a383807366f91212b81b17cac20131a8

    SHA512

    29d22703589df058c7f3509ce58f8e2f8fdf1fc2077e0622a796e4f9c17e563994e3cce83d74b5d58d79ae5b335a1e114c86ca7fe149bab10c3656c0acb0ae76

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    843a900c21c9720b2fe0ebc9fa6638dc

    SHA1

    004b0a1c48a144161fa53ddb8f636c88a5e4f201

    SHA256

    574f4dfdb1767ee8cd8e87d094f74a51cefd04c5d4b166ce28ade438b4a19f09

    SHA512

    6db387860a4468832be18c5ae6b13b2579474665b14589d3797bc7592132f243319c1a5cad7d5f54e9bfc8f530abc06510120cf6a34250cc6b9141c9952fd7d3

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    2KB

    MD5

    8968a8aecf08d306401e952756c2deef

    SHA1

    4b0fe5c55146bc73be30649ce7f06c916f0581bd

    SHA256

    69cc356f24b2b81aa65eec7cd1181d7039ddd8470887101af930470cd3d2f8bd

    SHA512

    06f42e996be2ec083267eb25ff22a02abbd6b1eb99ad813332db74a6f3f5b7bafc186d09dce54d54c5198dbf58497cabe387f4955601dbe321f74ccfd6f2c457

  • memory/1752-42-0x000000006FFD0000-0x0000000070005000-memory.dmp

    Filesize

    212KB

  • memory/1752-44-0x000000006FD90000-0x000000006FDAD000-memory.dmp

    Filesize

    116KB

  • memory/1752-45-0x000000006FD80000-0x000000006FD8B000-memory.dmp

    Filesize

    44KB

  • memory/1752-123-0x000000006E9B0000-0x000000006EF72000-memory.dmp

    Filesize

    5.8MB