Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1475s -
max time network
1491s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/03/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
%3F.mp3
Resource
win11-20240221-en
General
-
Target
%3F.mp3
-
Size
4.8MB
-
MD5
d887bb38b2923931a3564ecef2b3c717
-
SHA1
97afed6209cf3a7d3144a23cb52f6c8cf28c656a
-
SHA256
dafe2ef1f5b38be10a074295677801c5ba717f68d00f4ff93f5c69468684533e
-
SHA512
947fd7212adffd6f60b964cbe270a817ff01067b76085a75ee55b709d7b3416f8fb1613346008dddb86a5c882c246b4509b12992786c72d9569008b0e85c60ed
-
SSDEEP
98304:ZRhfe6r7X34O/Rfo8mOLphkMnPBzmv06rbmMrFc7BbmfNfV0zP:Zrh34O/RAzOLphkazmvVrylbiNfVUP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1520 unregmp2.exe Token: SeCreatePagefilePrivilege 1520 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1716 1608 wmplayer.exe 82 PID 1608 wrote to memory of 1716 1608 wmplayer.exe 82 PID 1608 wrote to memory of 1716 1608 wmplayer.exe 82 PID 1608 wrote to memory of 1288 1608 wmplayer.exe 83 PID 1608 wrote to memory of 1288 1608 wmplayer.exe 83 PID 1608 wrote to memory of 1288 1608 wmplayer.exe 83 PID 1288 wrote to memory of 1520 1288 unregmp2.exe 84 PID 1288 wrote to memory of 1520 1288 unregmp2.exe 84
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\%3F.mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\%3F.mp3"2⤵PID:1716
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e709816d7074410920fe4815d4ba6f6e
SHA1cc8c7f106270cc8c0bb58204a680d0f50ac54859
SHA25657f6039da23299fea0006f191fd2fa1ff515336f130ccef0382b016f59effbc7
SHA512f6c020ecf8e7a323d7555358bae5e844450078ac345ab56e45292b8670c87c203de8b462e8f79a0f121cf71277e195415ac7f19cc56144d9eeab892bbf5dff6f
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5340c91af42adfe43e4416af85f089485
SHA1e3c62fdd0a12d8cae5e103411ee6d9f75a61ecee
SHA256559c04591a016939dcb148b388871da6babb25e1f2591a586b5340d158431faa
SHA512aba392b867894328e6ecafbc3454b05c42bd630de9d036b7806629e04cca9342173ae851c8ef839c8285293937c5108a349c9c65660b9ea65b270aff657dbb03