Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
0806(4).mp3
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0806(4).mp3
Resource
win10v2004-20240802-en
General
-
Target
0806(4).mp3
-
Size
59KB
-
MD5
96ada4fdc1cc1fcb1d234f7b96a74adc
-
SHA1
0a8d1806c8de52afbd7607c68d2c575f52a7fef5
-
SHA256
614a723a76e12843d611815ffa1d5978ede6fec46362599ec5d5be8dae625d77
-
SHA512
5dea7b2fbf0a7e8a04cd4f56806e7766aeb5d2d5a03edbfcfcf66ca36d3d580a285e15f4886ca7ce88ddde8ab2adf2168d101a95bfc884c50beafc250c7a7550
-
SSDEEP
768:dEHysnynMjJh601ZQOSkG2E8juVtqKoI/5cMEjIwJRrqmLRAJc+u1PdcPB6qTLIJ:uS3MW0IzPCKcJfNVqc+u1Pdcz2n
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2392887640-1187051047-2909758433-1000\{38C0E1D1-0AAB-49B1-B978-33B141FDE0AF} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2024 unregmp2.exe Token: SeCreatePagefilePrivilege 2024 unregmp2.exe Token: SeShutdownPrivilege 1332 wmplayer.exe Token: SeCreatePagefilePrivilege 1332 wmplayer.exe Token: 33 4244 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4244 AUDIODG.EXE Token: SeShutdownPrivilege 1332 wmplayer.exe Token: SeCreatePagefilePrivilege 1332 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1332 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4652 1332 wmplayer.exe 85 PID 1332 wrote to memory of 4652 1332 wmplayer.exe 85 PID 1332 wrote to memory of 4652 1332 wmplayer.exe 85 PID 4652 wrote to memory of 2024 4652 unregmp2.exe 86 PID 4652 wrote to memory of 2024 4652 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\0806(4).mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3204
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD595e195ba88a77484a73c9cb38ebed71a
SHA1ece37a6e6b6e7bd52e8426bb7217b648ddb3d6b4
SHA2567833e9bae2ee5845d2245fb1c97e4a5af36c08e28351d52589fd514d74b368f0
SHA51296b418205b70f4f8d1d20af984e4a947d7f757fa67d3a841eddd90a9c1864b530aa6f15583cc03825e18bf065ffb0419d56fc10a562079c2a874014742adf7df
-
Filesize
68KB
MD5ce223341867fa4602edbeaa9bbd76d25
SHA176e9497916e4a09b6194b202ed9c0c6f7797eb2b
SHA256d8da4c63d8a00e8af7528d0e3757e5728304e42a2a0dd23d7176c774f630ae99
SHA512784d3813c3c240a23b267544b25facb446b3997b75694f974b14d6f9975fa23737b2e02ca9461473185e9d717f0dbce47ab57ba4d9c2f1be56c3d29885f5dda4
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD57a31216ccf05e20935c6548a7ba4e0ab
SHA1caf40d7de3345e35eb1011f9af9a907a7a0b5952
SHA2564de536b1dc75c3cf4df93d67db1d2ab62590a4a5c570ffa39771a85bc4378dfa
SHA51249f2cbff6436e094375613f19b2361bc69dd27876d5cb96d40742e5ad484b622942f334b489f0ac89957d582defc2d3ded023e31ea82a7b19cc9f9da5fcd53ef