Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 03:07

General

  • Target

    $PLUGINSDIR/locate.dll

  • Size

    17KB

  • MD5

    7d3317f57c1a368480ace3c0ca804eeb

  • SHA1

    d4c7e185bc64aac82339f51ba6c21cf0713c9f1a

  • SHA256

    d88a04c1e39db583eaad727fd390fe599ab10198ee040bfbdd22daefadbd2372

  • SHA512

    5598c2e6caa2f66edd48f8c8305e054d4b0740b5f2b7ed92cf197a13ac66ba99a32013d34b3c2e28d007ab7979eb90a50681324eb736b1410e7df1902e4ec32a

  • SSDEEP

    384:ev/vPBkA6dK8wiLe45naPji7hpx2kRV+qgm:evyvwiNnGji7Xxjc8

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\locate.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\locate.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 228
        3⤵
        • Program crash
        PID:2104
  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\unregmp2.exe
        C:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT
          4⤵
          • Modifies Installed Components in the registry
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Modifies registry class
          PID:1112
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\system32\unregmp2.exe" /PerformIndivIfNeeded
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /PerformIndivIfNeeded /REENTRANT
          4⤵
            PID:1560
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play C:\Users\Admin\Desktop\CopyAdd.wmx
          3⤵
          • Enumerates connected drives
          • Suspicious use of FindShellTrayWindow
          PID:1984
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:1960
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x540
      1⤵
        PID:1004

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\{F8E015D3-D125-4A18-8A06-C56CE56DB4C8}.jpg

        Filesize

        22KB

        MD5

        35e787587cd3fa8ed360036c9fca3df2

        SHA1

        84c76a25c6fe336f6559c033917a4c327279886d

        SHA256

        98c49a68ee578e10947209ebc17c0ad188ed39c7d0c91a2b505f317259c0c9b2

        SHA512

        aeec3eed5a52670f4cc35935005bb04bb435964a1975e489b8e101adfbce278142fd1a6c475860b7ccb414afe5e24613361a66d92f457937de9b21a7a112e1f9

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_372.wmdb

        Filesize

        1.0MB

        MD5

        b9c163f92e8911d5da300a84cc91b892

        SHA1

        c373bd8d4da344b0e406e20ef7a439e69de7ccd8

        SHA256

        6b4a147e430dc12997d7be68484cff295b271c40ae5b8f8671bfb83765aa633a

        SHA512

        250feb6585d21377498b62b50d253c8ba0b5e63c91a4682b945ea10d86eeb044c726128809ea72d1a37b2c46780e5f6f709a6d897e9ddfc2d9cb48c78eb19c6a

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_372.wmdb

        Filesize

        1.0MB

        MD5

        6d480d21967ab1283c1c33263339ed1b

        SHA1

        1a94adab0f39f1a6b9d1cc7458694f0c75bdc5c9

        SHA256

        ed923770ddfe7f2ef41802aaadf135e09293bb61f1c708b2a4937093ce9bd970

        SHA512

        4d95fb5ddd9bf4b6d8221fb755dbda1b395be5fedf8c1c3498286ff5739e3629c4e91de315b892cf98c0de10a986cc4cbe8bc1f1f1ca73b5f20986b0ff3c619d

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\lastplayed.wpl

        Filesize

        356B

        MD5

        22a577b001455d04afd80b6734a41e32

        SHA1

        d0b1cbaab07db71b4108ec2a12f99253bf22f5c7

        SHA256

        e45ecab9a45410437cad5d8862e4716561a58e5f1a8e2d7aca5af318174381d6

        SHA512

        8687dd030abc84fafbc83acab0d4a094bc86eabe13d9b72c5ee5c4d823355fd64ff010a3f184e29a3391f28606f01c71047aa7d7b822945f1c4f554e824328ab

      • C:\Users\Admin\AppData\Local\Temp\tmp17974.WMC\allservices.xml

        Filesize

        546B

        MD5

        df03e65b8e082f24dab09c57bc9c6241

        SHA1

        6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf

        SHA256

        155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba

        SHA512

        ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

      • C:\Users\Admin\AppData\Local\Temp\tmp19940.WMC\serviceinfo.xml

        Filesize

        523B

        MD5

        d58da90d6dc51f97cb84dfbffe2b2300

        SHA1

        5f86b06b992a3146cb698a99932ead57a5ec4666

        SHA256

        93acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad

        SHA512

        7f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        3KB

        MD5

        722463bb49d72be1d1d752ba5937896e

        SHA1

        5246827d15f4d8f7dedd74d8f809fc2c796a9792

        SHA256

        73d255c8d6e0cb46c12a29610385ace4f04d71c9015a03699988dab3cce223e1

        SHA512

        ca5eccf8c7a235db5e8305b3d76febf3dddc2510a33aacb7d3042adfcbe7d6b1deccb8f984d1673024ff8f186cd7695ca6b6b5b9083b3b2bcf53cb495bfd5bb4

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        4KB

        MD5

        a06f729346d93b03405b8d5bbb4911a1

        SHA1

        42d54ab20b84871d284ef6ada846a799d932be62

        SHA256

        8d44b45d4596134ae036dd362242519abc9d15bce8354868c4f06968b0e8eaca

        SHA512

        2a8ab45afa967c01a214b12189aa121a0f7bc0739169600f8b74628f8c0a5199068bb34b39725863c23cf0d9f232e5cc87cbd5ee1f83c5a2cca931793731d084

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        3KB

        MD5

        f4f8466d92a47048f2df6a12b92615c7

        SHA1

        58c193100f0050d0a9a0e9fa71bde054794e6538

        SHA256

        5d842e8627b47757ae061e613794ff28ca91443d2ce238d4d5614bad7ddebbbe

        SHA512

        b657127e5a1120280e69a76e4acaf2eb3d9c0694dafdf479213d73c4f32fb69f82cc6186a0d8ee8a72c1466233989e4c72b302f325257b39bb3a4ec8c88aba5d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms~RFf782d28.TMP

        Filesize

        1KB

        MD5

        4fa692bf07e310869b7e7d2d7dbc25bc

        SHA1

        31ed5c6fd48c624cf92960b9848f987e6d47f000

        SHA256

        ec9fe5f8a8e58d417e1eeba08d89ad2618dae89f5a1ddfb30f3ce4e6a53f2497

        SHA512

        fc70580d14f34d8fd2d66efff3651cb9c50746653a3ddd3b1a41ebd314ee2834c3ef291261874b64a18bd5d9c11a312c705b634a9187a79f9b6e47043972c5f2

      • memory/1560-26-0x000007FEF6D20000-0x000007FEF6DF1000-memory.dmp

        Filesize

        836KB

      • memory/1560-24-0x000007FEF6F70000-0x000007FEF7098000-memory.dmp

        Filesize

        1.2MB

      • memory/1560-34-0x000007FEF7B80000-0x000007FEF7C42000-memory.dmp

        Filesize

        776KB

      • memory/1560-15-0x000007FEF7B80000-0x000007FEF7C42000-memory.dmp

        Filesize

        776KB

      • memory/1560-35-0x000007FEF6F70000-0x000007FEF7098000-memory.dmp

        Filesize

        1.2MB

      • memory/1560-36-0x000007FEF6D20000-0x000007FEF6DF1000-memory.dmp

        Filesize

        836KB

      • memory/1960-58-0x0000000004580000-0x0000000004582000-memory.dmp

        Filesize

        8KB

      • memory/1960-64-0x0000000004680000-0x000000000468A000-memory.dmp

        Filesize

        40KB

      • memory/1960-65-0x0000000072210000-0x0000000072301000-memory.dmp

        Filesize

        964KB

      • memory/1960-69-0x0000000004700000-0x000000000470A000-memory.dmp

        Filesize

        40KB

      • memory/1960-70-0x0000000004700000-0x000000000470A000-memory.dmp

        Filesize

        40KB

      • memory/1960-68-0x0000000004700000-0x000000000470A000-memory.dmp

        Filesize

        40KB

      • memory/1960-67-0x0000000004700000-0x000000000470A000-memory.dmp

        Filesize

        40KB

      • memory/1960-66-0x0000000004700000-0x000000000470A000-memory.dmp

        Filesize

        40KB

      • memory/1960-55-0x0000000000100000-0x0000000000101000-memory.dmp

        Filesize

        4KB

      • memory/1984-25-0x0000000000140000-0x0000000000141000-memory.dmp

        Filesize

        4KB