Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1www.subs.r...01.rar
windows7-x64
3www.subs.r...01.rar
windows10-2004-x64
8Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...p].srt
windows7-x64
3Justice.Le...p].srt
windows10-2004-x64
3Justice.Le...07.srt
windows7-x64
3Justice.Le...07.srt
windows10-2004-x64
3Justice.Le...07.srt
windows7-x64
3Justice.Le...07.srt
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x01 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x01 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x02 [BluRay][x264][1080p].srt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x02 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x03 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x03 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x04 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x04 [BluRay][x264][1080p].srt
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x05 [BluRay][x264][1080p].srt
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x05 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x06 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x06 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x07 [BluRay][x264][1080p].srt
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x07 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x08 [BluRay][x264][1080p].srt
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x08 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x09 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x09 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x10 [BluRay][x264][1080p].srt
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x10 [BluRay][x264][1080p].srt
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x11 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x11 [BluRay][x264][1080p].srt
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x12 [BluRay][x264][1080p].srt
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x12 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x13 [BluRay][x264][1080p].srt
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x13 [BluRay][x264][1080p].srt
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
Justice.League.Unlimited.S03.BluRay.720p.vk007/Justice.League.Unlimited.S03E01.720p.vk007.srt
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
Justice.League.Unlimited.S03.BluRay.720p.vk007/Justice.League.Unlimited.S03E01.720p.vk007.srt
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Justice.League.Unlimited.S03.BluRay.720p.vk007/Justice.League.Unlimited.S03E02.720p.vk007.srt
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
Justice.League.Unlimited.S03.BluRay.720p.vk007/Justice.League.Unlimited.S03E02.720p.vk007.srt
Resource
win10v2004-20240419-en
General
-
Target
www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar
-
Size
274KB
-
MD5
fe4e3a8852a9d01a2d3716cb27d0512d
-
SHA1
96147471435c8992cf96f6741d6b517a75e520d5
-
SHA256
5febf594512f13b3374ab927bbb266375e612c6b86f02ccdcb46f52898518bb2
-
SHA512
83f27bf494ac073f18480cb2d73fabc9fc33647f20f363bd686aeb0343f2ab1d8f8914c4cbb4c513c2b04f64c6ba762acd471d118d50c1ba8f692529e373b7cd
-
SSDEEP
6144:BTwoUA6wMiETudmDkWGNv7qPrZUzolpAg2bRL:BTL9MiEiHWMOraz1RL
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95} unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\DontAsk = "2" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\Version = "12,0,19041,1266" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\IsInstalled = "0" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\Stubpath = "%SystemRoot%\\system32\\unregmp2.exe /ShowWMP" unregmp2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops desktop.ini file(s) 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini unregmp2.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play\command\DelegateExecute = "{ed1d0fdf-4414-470a-a56d-cfb68623fc58}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Play unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Play\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\command\DelegateExecute = "{45597c98-80f6-4549-84ff-752cf55e2d29}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Play\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9801" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue\command unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{A45AEC2B-549E-405F-AF3E-C6B03C4FDFBF}\ = "Toggle DMR Authorization Handler" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Enqueue\NeverDefault unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play\command unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Enqueue\command unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play\ = "&Play with Windows Media Player" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\ = "&Add to Windows Media Player list" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{17FC1A80-140E-4290-A64F-4A29A951A867}\ = "Open Media Sharing Handler" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Enqueue\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Enqueue\command\DelegateExecute = "{45597c98-80f6-4549-84ff-752cf55e2d29}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Enqueue\command unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play\command\DelegateExecute = "{ed1d0fdf-4414-470a-a56d-cfb68623fc58}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Enqueue unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Enqueue\command\DelegateExecute = "{45597c98-80f6-4549-84ff-752cf55e2d29}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Video\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{A45AEC2B-549E-405F-AF3E-C6B03C4FDFBF} unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9801" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Play\ = "&Play with Windows Media Player" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play\NeverDefault unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9801" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Video\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Enqueue\command unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Play\command\DelegateExecute = "{ed1d0fdf-4414-470a-a56d-cfb68623fc58}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\image\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play\ = "&Play with Windows Media Player" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Play\NeverDefault unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play\ = "&Play with Windows Media Player" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Enqueue\ = "&Add to Windows Media Player list" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Play unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9801" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Enqueue\ = "&Add to Windows Media Player list" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Enqueue unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\command unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Play\ = "&Play with Windows Media Player" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue\ = "&Add to Windows Media Player list" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Video\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shellex\ContextMenuHandlers\PlayTo\ = "{7AD84985-87B4-4a16-BE58-8B72A5B390F7}" unregmp2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 100 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 100 7zFM.exe Token: 35 100 7zFM.exe Token: SeSecurityPrivilege 100 7zFM.exe Token: SeShutdownPrivilege 228 unregmp2.exe Token: SeCreatePagefilePrivilege 228 unregmp2.exe Token: SeShutdownPrivilege 3352 wmplayer.exe Token: SeCreatePagefilePrivilege 3352 wmplayer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 100 7zFM.exe 100 7zFM.exe 100 7zFM.exe 3352 wmplayer.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4436 wrote to memory of 100 4436 cmd.exe 92 PID 4436 wrote to memory of 100 4436 cmd.exe 92 PID 1768 wrote to memory of 3684 1768 OpenWith.exe 105 PID 1768 wrote to memory of 3684 1768 OpenWith.exe 105 PID 1768 wrote to memory of 3684 1768 OpenWith.exe 105 PID 3684 wrote to memory of 3696 3684 wmplayer.exe 106 PID 3684 wrote to memory of 3696 3684 wmplayer.exe 106 PID 3684 wrote to memory of 3696 3684 wmplayer.exe 106 PID 3684 wrote to memory of 372 3684 wmplayer.exe 107 PID 3684 wrote to memory of 372 3684 wmplayer.exe 107 PID 3684 wrote to memory of 372 3684 wmplayer.exe 107 PID 372 wrote to memory of 228 372 unregmp2.exe 108 PID 372 wrote to memory of 228 372 unregmp2.exe 108 PID 3696 wrote to memory of 1044 3696 setup_wm.exe 109 PID 3696 wrote to memory of 1044 3696 setup_wm.exe 109 PID 3696 wrote to memory of 1044 3696 setup_wm.exe 109 PID 1044 wrote to memory of 1704 1044 unregmp2.exe 110 PID 1044 wrote to memory of 1704 1044 unregmp2.exe 110 PID 3696 wrote to memory of 3352 3696 setup_wm.exe 111 PID 3696 wrote to memory of 3352 3696 setup_wm.exe 111 PID 3696 wrote to memory of 3352 3696 setup_wm.exe 111
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:2296
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\AppData\Local\Temp\7zO46005CC8\Justice League - 03x01 [BluRay][x264][1080p].srt"2⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\AppData\Local\Temp\7zO46005CC8\Justice League - 03x01 [BluRay][x264][1080p].srt"3⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\unregmp2.exeC:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary4⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT5⤵
- Modifies Installed Components in the registry
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
PID:1704
-
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play "C:\Users\Admin\AppData\Local\Temp\7zO46005CC8\Justice League - 03x01 [BluRay][x264][1080p].srt"4⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3352
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon3⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT4⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5dbfc662304aa4236ac6c685fdd3ee597
SHA1bee96b9256c93a35398a8c6a341da9470c6101c2
SHA256dfd76fd8ae4d04c006729be160e7c23fe8e003e7094a54abf3a5aaee1a5c5590
SHA5126730c50e8217e93d819b24a76af50ed9afeb34c73f32bcf65cca1bac139219c4897f7a43faa7a88909b32777420f47beb2a1ab23fad5886ef4da35226305c42b
-
Filesize
1024KB
MD565c10d4ffac8f479813c448a488e584b
SHA1858de8c038d739c9e72b0f21009e874aa347f909
SHA2569563dd2a459f4aad2e21b581cc563c6ff26301543fa7ffd46a8e57e6ea74a322
SHA5120cb04be466cfa32e9fe54750706717b1bb7787c39625b1a2430a7023bb53cb93ac51a641065f16f038a6a344e21dbceada0a6ad2cc427baab15aa27a10f09e54
-
Filesize
68KB
MD5a825662ff66fddc6d7f86ca85b58135f
SHA1dc7a645bd1bee34c6a41cb21a61058bc6e16a3c0
SHA25625c3391c92ae0bf3a895afb17a873dc13b02a80c89fc1cae42b1e8c7efd684e8
SHA5128839b2fe729191718bf2a2230e98e0acfb1020d7e428cba499850c9f10deb929fb41b9276f47bd691fb68351479a5586d48f81aca6d101f2f5f7ec0edda82595
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
12KB
MD57d6d5e1ffea3d96edc1bc3bd05f6eab0
SHA1374f08f4dfa41c15727a6047d74e8d7571bc34a3
SHA2561388f40b3d6357d7e099a85a0ac4294ad5ef20ccfa6044b394e80785a16db2db
SHA51246c2a71cb08b09e8d0f6771b854cdfc429b50bfe767837e4658c2434d80d3ed83225285da07983dded2ff6c990b86520085c290e6fd427a3520292f0750dfcbd
-
Filesize
1KB
MD565e822cc5edf05382e820d2cd6be1f1a
SHA1a2258533a5eec45590fae4569d691b5b55784eb9
SHA2564438051f86247c766233f35d110a262ed1db4fd8e9fcb87ab9497fa2f677fcb3
SHA5122c7eedb2070d2d6678d5eb6f41f3a9cbc38d335aa07e6de2ac03a29eb83d4a3601b2023112f9db1c805a1ff2b08e034844fffbb1bddb24ce1d70eecfa602b214
-
Filesize
3KB
MD50e76643f0227c779c3b98bba5b6eac64
SHA1ae62f21a152506c8ad219e37a214a819ab815311
SHA256fad2126de2877abe05757ebf257a38949ec618ec004c7e71b56dcda1f56fda32
SHA51222e45c1a3abf312ba278c1ebd0f9e046adc3ef9c8eea5ea48a27c691cbabdd841d53555128fb1609a5e32e557bf872161fa1c3ea115a73ce4f9f0cdab403565e