Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2024, 21:58

General

  • Target

    art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1205.wav

  • Size

    191KB

  • MD5

    7477b9e2d3ba597675a1c05aa8de584f

  • SHA1

    71e7923ec48aa8edaf1f5bbb734ce1e848162b40

  • SHA256

    204ce64810d236a88870a9467ab2b73ef2a2cf5d2c9d2d0f6e955da5e9a95733

  • SHA512

    82a52425699af59fab6132ea71bafaef556ebfecc6db762df168c693862943878e9146ab7648f1dee2457d3d0506a8a01b9267dafe63319ed82115602feb752b

  • SSDEEP

    1536:+dCp5tIOxjy4MO8fx4C3o9cUDAUZi7GR2PPJKSlA:Vh8vRs2J

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\art\sound\engine\0BE1F1A5405C187702AEE893B40ABF5F\EXH_1205.wav"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\art\sound\engine\0BE1F1A5405C187702AEE893B40ABF5F\EXH_1205.wav"
      2⤵
        PID:3856
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:1076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      384KB

      MD5

      063793e4ba784832026ec8bc3528f7f1

      SHA1

      687d03823d7ab8954826f753a645426cff3c5db4

      SHA256

      cb153cb703aea1ba1afe2614cffb086fa781646a285c5ac37354ee933a29cedd

      SHA512

      225910c24052dfdf7fca574b12ecef4eb68e990167010f80d7136f03ac6e7faa33233685cbf37b38ee626bb22ff3afeee39e597080e429be3ec241fb30af40c6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      9250b600cbcd957457a2689da609216a

      SHA1

      35bfc7eef1a3101325542f1910f58d2ebd82c163

      SHA256

      06fcd32ce1b52d2ab2b80b5c5b6cfdc3459b5c8e92278f144890f4ed44f594d9

      SHA512

      704301b2c26735b57b9a1cecb3e609b708071a8f41c5ec722f24a41d5c0404da5c3fecfd2408935d38eef166540d5b83af12b2968bf9199b2ea058d97dc3b59f