Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Wave.JohnP...ed.rar
windows10-1703-x64
8CefSharp.C...me.dll
windows10-1703-x64
1WaveWindow...ed.exe
windows10-1703-x64
10bin/Background.mp4
windows10-1703-x64
6bin/lz4.dll
windows10-1703-x64
1bin/wolfssl.dll
windows10-1703-x64
1bin/xxhash.dll
windows10-1703-x64
1bin/zlib1.dll
windows10-1703-x64
1bin/zstd.dll
windows10-1703-x64
1cracked by...lx.txt
windows10-1703-x64
1d3dcompiler_47.dll
windows10-1703-x64
1Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29/06/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
Wave.JohnPrlx.cracked.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
CefSharp.Core.Runtime.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
WaveWindowsCracked.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
bin/Background.mp4
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
bin/lz4.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
bin/wolfssl.dll
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
bin/xxhash.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
bin/zlib1.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
bin/zstd.dll
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
cracked by JohnPrlx.txt
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
d3dcompiler_47.dll
Resource
win10-20240404-en
General
-
Target
bin/Background.mp4
-
Size
4.6MB
-
MD5
9782180eb68f73030fe24ef6a1735932
-
SHA1
589827fe098ba048c9f871a28db8eae3e3537ff4
-
SHA256
3a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
-
SHA512
dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
SSDEEP
98304:xs/6Ldccul3Wn48btjNEkPSFTaIwJ0Mt6KNY:xs/Gul3EvEmFItMkb
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4892 unregmp2.exe Token: SeCreatePagefilePrivilege 4892 unregmp2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4856 4672 wmplayer.exe 71 PID 4672 wrote to memory of 4856 4672 wmplayer.exe 71 PID 4672 wrote to memory of 4856 4672 wmplayer.exe 71 PID 4672 wrote to memory of 4636 4672 wmplayer.exe 72 PID 4672 wrote to memory of 4636 4672 wmplayer.exe 72 PID 4672 wrote to memory of 4636 4672 wmplayer.exe 72 PID 4636 wrote to memory of 4892 4636 unregmp2.exe 73 PID 4636 wrote to memory of 4892 4636 unregmp2.exe 73
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\bin\Background.mp4"1⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\bin\Background.mp4"2⤵PID:4856
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD50e807656bd86f2aef7ccf207f963973b
SHA127052af8d103d134369e356b793eb88ba873df55
SHA256c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162
SHA512e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5b5e296b6bee2dad4f281306d9390083a
SHA1490d5ffc4ac8f7c76c136c255c92ece63805cd63
SHA256647affb123252c253917542e2ee0b2673731da88352b6f5d33966c139a0821f1
SHA512078816af70345b61d061e425a1034f116c929ea9643c2d7b572683dbf415455e417a9187a28136e2127b49f0207714bb24432d326f3afab9fb99767cc219ac30