Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
257s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
19/02/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
9fdnHxWR9eGzMag3.mp4
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
9fdnHxWR9eGzMag3.mp4
Resource
win10v2004-20231215-en
General
-
Target
9fdnHxWR9eGzMag3.mp4
-
Size
181KB
-
MD5
49926abab2b19c7e021af51393c5bc3c
-
SHA1
3570ef6015d965a86ee8158ea0902bd4f0a12a5b
-
SHA256
31d66dd838b4f7fd10513f8f84d85cc691c27356a9e86e48e3669c1f3f537342
-
SHA512
5581ecc4aa2183bad42dfd9261864b270452f57ad8fd0c03891c5ace54cfcbad2a0f58cc1bb742e789204d4e7e113d64bf6c0850dc9202e5d82571a6b4cf8236
-
SSDEEP
3072:UHUm37/qKvj7kdd1TQLBTvF397UjFdgDq/b5tmytZ0kAY05Zr1FllKaj:UH5L/Bj7kdd16FtUFiDq/bjm8Z0DOaj
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 164 unregmp2.exe Token: SeCreatePagefilePrivilege 164 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3696 wrote to memory of 1516 3696 wmplayer.exe 72 PID 3696 wrote to memory of 1516 3696 wmplayer.exe 72 PID 3696 wrote to memory of 1516 3696 wmplayer.exe 72 PID 3696 wrote to memory of 4880 3696 wmplayer.exe 73 PID 3696 wrote to memory of 4880 3696 wmplayer.exe 73 PID 3696 wrote to memory of 4880 3696 wmplayer.exe 73 PID 4880 wrote to memory of 164 4880 unregmp2.exe 74 PID 4880 wrote to memory of 164 4880 unregmp2.exe 74
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\9fdnHxWR9eGzMag3.mp4"1⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\9fdnHxWR9eGzMag3.mp4"2⤵PID:1516
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD598df921f667bf303621c789390ed9f2e
SHA1d9c82e51534cf1c2eb5a255286de6a09ca364d1a
SHA2568b8497d37fa9ddd44e275aa7631d7c7173c384a501d11e73e3d4401513c4bbe3
SHA51258e896295763c2729c5a19986356e7cc7706265bbda5cd9cec98201ec9ce86c4b68a3e388c86aba198870ca4b8ab1a7876f2d8e1fff7437216dd2789b3ed3796
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD57080d46ebca59f639f2d7ca019ed106b
SHA190aa0742a5f3fa19b063a2ca3bd999c0aef491c6
SHA256283cd639b39097f7a7cf0295334e653498293db21dd59f03ce4bbec1d180af94
SHA5122645b2aa255fee5c5448c5fcdaa3cc8afe11d90a4d1ca986dcbf1cf8430964e7639683fbab595000d9ae4b820129812685f6181c0dfb1fcff9fd5ff04ac55101