Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
Monkey Fakee Skip Sample.mp4
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Monkey Fakee Skip Sample.mp4
Resource
win10v2004-20240802-en
General
-
Target
Monkey Fakee Skip Sample.mp4
-
Size
343KB
-
MD5
b939a5b557219474abb381366e0e70dc
-
SHA1
cbe8f789e015f291f826a3611a41e0c1fa10976a
-
SHA256
44741b21ec9d87abd99ba339749e3f9e390a6c37a49645957b72d57292882145
-
SHA512
10c9394369b7bc8a8ffa008fd58c6650f08dc0a8646519bb412597875165b5cc20fb7b278f5b50d934bb0594138c64b846b450f695b0e895ea58f7a8064f2d80
-
SSDEEP
3072:0uDXEohS/v0m8m7ciDh83inxpKMgDtz1iu2i4S8P3bUvIoqZG:H4oo/1Ncid83in2M4zEu2i0P3bUp
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{28E72CD1-2F55-49DA-BC64-831177732969} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3896 wmplayer.exe Token: SeCreatePagefilePrivilege 3896 wmplayer.exe Token: SeShutdownPrivilege 5052 unregmp2.exe Token: SeCreatePagefilePrivilege 5052 unregmp2.exe Token: 33 4644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4644 AUDIODG.EXE Token: SeShutdownPrivilege 3896 wmplayer.exe Token: SeCreatePagefilePrivilege 3896 wmplayer.exe Token: SeShutdownPrivilege 3896 wmplayer.exe Token: SeCreatePagefilePrivilege 3896 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3896 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3896 wrote to memory of 5056 3896 wmplayer.exe 85 PID 3896 wrote to memory of 5056 3896 wmplayer.exe 85 PID 3896 wrote to memory of 5056 3896 wmplayer.exe 85 PID 5056 wrote to memory of 5052 5056 unregmp2.exe 86 PID 5056 wrote to memory of 5052 5056 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Monkey Fakee Skip Sample.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2416
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2c8 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5f63420442b67dfd4d341e8db8dd5ec7f
SHA16472a539757ba7ccade29887f2d86eea95b36af0
SHA25648ef6c07237ebb2772b4ace5a724b6fe081eb4dc3f596955ab0fbe8d0fc064d7
SHA512d43f7f4dedaf56f2b54951ef05fc7168e9d0d3829d5a8678ed6df4c10509259a4a86b0bc6e017397aa981a3908c5b00688bb668f7bec32a2a73fd6333fa82c83
-
Filesize
1024KB
MD5a3bca22de08d20b2f83fde84c33b4c3a
SHA1b0acaf3bfe512b74ab02d4f3021e59129db943ff
SHA25636c3c6fd003057cd78827aa73af846baa87d0920a88042a667ac43a86c1c818d
SHA5123b0500bd53fdf6eaeb80d394b3237289d513255b34af0e194d0f3abadc47ad831a294f6da853493ffb94005d1988d694492b1cebd13a795cac2609d5cb9a7960
-
Filesize
68KB
MD58b888bd2fb15481e711c67efa0f3e26c
SHA101e009b13961cf649ba7dd6a31e8bc8f7fc3b412
SHA2566db27649171e6a23b21c8085b47dc7e95c2f35cb627506d1402de81e7884459c
SHA512a38dd4a7c9a3206274ab15a1eb729c743d2dc3209118340a9acd0775368043df0ec4b253e239d07f451f632d67e13575cc301d18d2da4b2b3235588ade43c5ae
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5e52f4c20c5c4f896238819c021e3d3d2
SHA19a89b8760d69a60059d5bcfb071160378e5c6b5d
SHA256b5c40854b7a2199c306b481d05069e670998e9dd62b94f9acfc873ffd5b99494
SHA512e7e15da502cf7ccc0f7bb7fd274b511a74779e2453e36961f09613547c706aa26ed0fc3ded55545803a3f6e4af5c3cb7ec1b47b4c6b42ce07f963033403c6331
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5a3f957c13e6654740c98050b0b325699
SHA1bfdac67f57daffd3c304079b56dc4845ebbaeda8
SHA2568c074d6af83fbdeafeb3e5c72fce24986ed71870b492935904073d754baacedc
SHA512b52bb56d98fe6460f3670c0a3e6fa9459796dfdd9c89b01e8ba1ee667af70ac5b1aa2b5d0579f768c0c15a6037f28cfcf0c1890d268ced544161183f5c3478cf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD5ceb8ecd806609ed69ca6163bc6b39f61
SHA1ea306a96caed54ac7ea75dad03a0c74c70b4e966
SHA256d42eecb98d790c3190e3de79a79005875005760d33d17d87619d15600c855fc1
SHA512b07409a2199d0a2d3a36d601ece598b731f956065bed36b640390a7c358194d17f45b2e48d0e1be02feac799643dfb3ebf0dfd4f4d72cc283cdca6e3216672cc