Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1TOYOTA CHA...RS.zip
windows7-x64
1TOYOTA CHA...RS.zip
windows10-2004-x64
1art/sound/...D.json
windows7-x64
3art/sound/...D.json
windows10-2004-x64
3art/sound/...D.json
windows7-x64
3art/sound/...D.json
windows10-2004-x64
3art/sound/...D.json
windows7-x64
3art/sound/...D.json
windows10-2004-x64
3art/sound/...52.wav
windows7-x64
1art/sound/...52.wav
windows10-2004-x64
6art/sound/..._P.wav
windows7-x64
1art/sound/..._P.wav
windows10-2004-x64
6art/sound/...26.wav
windows7-x64
1art/sound/...26.wav
windows10-2004-x64
6art/sound/..._P.wav
windows7-x64
1art/sound/..._P.wav
windows10-2004-x64
6art/sound/...05.wav
windows7-x64
1art/sound/...05.wav
windows10-2004-x64
6art/sound/..._P.wav
windows7-x64
1art/sound/..._P.wav
windows10-2004-x64
6art/sound/...89.wav
windows7-x64
1art/sound/...89.wav
windows10-2004-x64
6art/sound/..._P.wav
windows7-x64
1art/sound/..._P.wav
windows10-2004-x64
6art/sound/...80.wav
windows7-x64
1art/sound/...80.wav
windows10-2004-x64
6art/sound/..._P.wav
windows7-x64
1art/sound/..._P.wav
windows10-2004-x64
6art/sound/...76.wav
windows7-x64
1art/sound/...76.wav
windows10-2004-x64
6art/sound/..._P.wav
windows7-x64
1art/sound/..._P.wav
windows10-2004-x64
6Analysis
-
max time kernel
146s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
TOYOTA CHASER SPEEDSTARS.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
TOYOTA CHASER SPEEDSTARS.zip
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
art/sound/blends/0BE1F1A5405C187702AEE893B40ABF5F.sfxBlend2D.json
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
art/sound/blends/0BE1F1A5405C187702AEE893B40ABF5F.sfxBlend2D.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
art/sound/blends/7264393240D9A7C048B7E98A2DCCBFA4.sfxBlend2D.json
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
art/sound/blends/7264393240D9A7C048B7E98A2DCCBFA4.sfxBlend2D.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
art/sound/blends/7A09CBD542D071044236308F863FE819.sfxBlend2D.json
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
art/sound/blends/7A09CBD542D071044236308F863FE819.sfxBlend2D.json
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1052.wav
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1052.wav
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1052_P.wav
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1052_P.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1126.wav
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1126.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1126_P.wav
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1126_P.wav
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1205.wav
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1205.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1205_P.wav
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1205_P.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1289.wav
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1289.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1289_P.wav
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1289_P.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1380.wav
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1380.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1380_P.wav
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1380_P.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1476.wav
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1476.wav
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1476_P.wav
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1476_P.wav
Resource
win10v2004-20240419-en
General
-
Target
art/sound/engine/0BE1F1A5405C187702AEE893B40ABF5F/EXH_1205.wav
-
Size
191KB
-
MD5
7477b9e2d3ba597675a1c05aa8de584f
-
SHA1
71e7923ec48aa8edaf1f5bbb734ce1e848162b40
-
SHA256
204ce64810d236a88870a9467ab2b73ef2a2cf5d2c9d2d0f6e955da5e9a95733
-
SHA512
82a52425699af59fab6132ea71bafaef556ebfecc6db762df168c693862943878e9146ab7648f1dee2457d3d0506a8a01b9267dafe63319ed82115602feb752b
-
SSDEEP
1536:+dCp5tIOxjy4MO8fx4C3o9cUDAUZi7GR2PPJKSlA:Vh8vRs2J
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1076 unregmp2.exe Token: SeCreatePagefilePrivilege 1076 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3856 2112 wmplayer.exe 92 PID 2112 wrote to memory of 3856 2112 wmplayer.exe 92 PID 2112 wrote to memory of 3856 2112 wmplayer.exe 92 PID 2112 wrote to memory of 772 2112 wmplayer.exe 93 PID 2112 wrote to memory of 772 2112 wmplayer.exe 93 PID 2112 wrote to memory of 772 2112 wmplayer.exe 93 PID 772 wrote to memory of 1076 772 unregmp2.exe 94 PID 772 wrote to memory of 1076 772 unregmp2.exe 94
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\art\sound\engine\0BE1F1A5405C187702AEE893B40ABF5F\EXH_1205.wav"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\art\sound\engine\0BE1F1A5405C187702AEE893B40ABF5F\EXH_1205.wav"2⤵PID:3856
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5063793e4ba784832026ec8bc3528f7f1
SHA1687d03823d7ab8954826f753a645426cff3c5db4
SHA256cb153cb703aea1ba1afe2614cffb086fa781646a285c5ac37354ee933a29cedd
SHA512225910c24052dfdf7fca574b12ecef4eb68e990167010f80d7136f03ac6e7faa33233685cbf37b38ee626bb22ff3afeee39e597080e429be3ec241fb30af40c6
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD59250b600cbcd957457a2689da609216a
SHA135bfc7eef1a3101325542f1910f58d2ebd82c163
SHA25606fcd32ce1b52d2ab2b80b5c5b6cfdc3459b5c8e92278f144890f4ed44f594d9
SHA512704301b2c26735b57b9a1cecb3e609b708071a8f41c5ec722f24a41d5c0404da5c3fecfd2408935d38eef166540d5b83af12b2968bf9199b2ea058d97dc3b59f