Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
06/11/2023, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
7274110982086036741.mov
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
7274110982086036741.mov
Resource
win10-20231020-en
General
-
Target
7274110982086036741.mov
-
Size
854KB
-
MD5
3e65f133032a11347c7fe3ad829e5696
-
SHA1
37729f8dbb3c85c5a59210e556ae8502aef3675b
-
SHA256
062f2c08c156b9ae3228ebfdd2f92e8215a31e3a8d8450a6fee53a5b1083cc0f
-
SHA512
07bcba0b62a6bd593d9bba8c7b74c591a7f3a2afb62dccbbceb8b12b171be3e9698890b280a8c3156c08f9ca26bed09e72604e85ae11d1a1083ff8cd323117ee
-
SSDEEP
24576:geqcpgKIa4GlrPx2cYwXyWqk4Gw24jETCjnP665Xd:vqygKIa4GNcDpk4GN2P665Xd
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 660 wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3796 unregmp2.exe Token: SeCreatePagefilePrivilege 3796 unregmp2.exe Token: SeShutdownPrivilege 660 wmplayer.exe Token: SeCreatePagefilePrivilege 660 wmplayer.exe Token: 33 4628 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4628 AUDIODG.EXE Token: SeShutdownPrivilege 660 wmplayer.exe Token: SeCreatePagefilePrivilege 660 wmplayer.exe Token: SeShutdownPrivilege 660 wmplayer.exe Token: SeCreatePagefilePrivilege 660 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 660 wmplayer.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2536 1276 wmplayer.exe 71 PID 1276 wrote to memory of 2536 1276 wmplayer.exe 71 PID 1276 wrote to memory of 2536 1276 wmplayer.exe 71 PID 1276 wrote to memory of 4288 1276 wmplayer.exe 72 PID 1276 wrote to memory of 4288 1276 wmplayer.exe 72 PID 1276 wrote to memory of 4288 1276 wmplayer.exe 72 PID 4288 wrote to memory of 3796 4288 unregmp2.exe 73 PID 4288 wrote to memory of 3796 4288 unregmp2.exe 73 PID 2536 wrote to memory of 660 2536 setup_wm.exe 74 PID 2536 wrote to memory of 660 2536 setup_wm.exe 74 PID 2536 wrote to memory of 660 2536 setup_wm.exe 74
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\7274110982086036741.mov"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\7274110982086036741.mov"2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\7274110982086036741.mov"3⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:660
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
- Drops file in Windows directory
PID:3900
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD598df921f667bf303621c789390ed9f2e
SHA1d9c82e51534cf1c2eb5a255286de6a09ca364d1a
SHA2568b8497d37fa9ddd44e275aa7631d7c7173c384a501d11e73e3d4401513c4bbe3
SHA51258e896295763c2729c5a19986356e7cc7706265bbda5cd9cec98201ec9ce86c4b68a3e388c86aba198870ca4b8ab1a7876f2d8e1fff7437216dd2789b3ed3796
-
Filesize
1024KB
MD512eb482cfb018a0661c593234757d970
SHA1e9ee49b15f5ac8ee5b55d838e8d37bf85635840c
SHA2563bb1f989bdf1894d3a0aeb61ae436ca9240e6b417ec803cbfba61f2e1475ed29
SHA512ecc488ec96e520f0ee14a0059e2b1e1aff8d4db86799bfac5f67c1a9f10bfee7128d3db306d09c1d421a0d600ca0b4fadd0ca8e7991c696910e2ac405c79253c
-
Filesize
68KB
MD50d7521a07406fcb9130dcaca4c55b64d
SHA1a358a3bc33d2faaf6abd7386f898731d9b0083e0
SHA2564f07eeed7c774ff081e149f49b6d1e6be0bfda7abfd586359932e30d9f0a6621
SHA512519dc0550ae28fbfcf7ef91a2b7a3811145dca6ddc4183f8c219c8b69fd90210098ce5ebee52072d9b4d23e2befb84ca5916cb1cfc51ffaa5496a25227168d74
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5e566fcb504dac06ea642f7179fe340b2
SHA17ec44285e9da7524b2a052cba54d288f1b5005e2
SHA256a198225c22d1e516cf8c0670f5a8acdea407e6b35721c36c5fbd0edde75fbece
SHA5120da7939779a245a4febb6ce812f6b16971671c72450c05d7b6487fd867b97c36c0817fbb313ccdc275d8064ec459e626ef49b61de4a6c061de39267153bd30b7