Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    21s
  • max time network
    12s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 18:56

General

  • Target

    Monkey Fakee Skip Sample.mp4

  • Size

    343KB

  • MD5

    b939a5b557219474abb381366e0e70dc

  • SHA1

    cbe8f789e015f291f826a3611a41e0c1fa10976a

  • SHA256

    44741b21ec9d87abd99ba339749e3f9e390a6c37a49645957b72d57292882145

  • SHA512

    10c9394369b7bc8a8ffa008fd58c6650f08dc0a8646519bb412597875165b5cc20fb7b278f5b50d934bb0594138c64b846b450f695b0e895ea58f7a8064f2d80

  • SSDEEP

    3072:0uDXEohS/v0m8m7ciDh83inxpKMgDtz1iu2i4S8P3bUvIoqZG:H4oo/1Ncid83in2M4zEu2i0P3bUp

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Monkey Fakee Skip Sample.mp4"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:5052
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:2416
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2c8 0x4f4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    384KB

    MD5

    f63420442b67dfd4d341e8db8dd5ec7f

    SHA1

    6472a539757ba7ccade29887f2d86eea95b36af0

    SHA256

    48ef6c07237ebb2772b4ace5a724b6fe081eb4dc3f596955ab0fbe8d0fc064d7

    SHA512

    d43f7f4dedaf56f2b54951ef05fc7168e9d0d3829d5a8678ed6df4c10509259a4a86b0bc6e017397aa981a3908c5b00688bb668f7bec32a2a73fd6333fa82c83

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    a3bca22de08d20b2f83fde84c33b4c3a

    SHA1

    b0acaf3bfe512b74ab02d4f3021e59129db943ff

    SHA256

    36c3c6fd003057cd78827aa73af846baa87d0920a88042a667ac43a86c1c818d

    SHA512

    3b0500bd53fdf6eaeb80d394b3237289d513255b34af0e194d0f3abadc47ad831a294f6da853493ffb94005d1988d694492b1cebd13a795cac2609d5cb9a7960

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    8b888bd2fb15481e711c67efa0f3e26c

    SHA1

    01e009b13961cf649ba7dd6a31e8bc8f7fc3b412

    SHA256

    6db27649171e6a23b21c8085b47dc7e95c2f35cb627506d1402de81e7884459c

    SHA512

    a38dd4a7c9a3206274ab15a1eb729c743d2dc3209118340a9acd0775368043df0ec4b253e239d07f451f632d67e13575cc301d18d2da4b2b3235588ade43c5ae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    e52f4c20c5c4f896238819c021e3d3d2

    SHA1

    9a89b8760d69a60059d5bcfb071160378e5c6b5d

    SHA256

    b5c40854b7a2199c306b481d05069e670998e9dd62b94f9acfc873ffd5b99494

    SHA512

    e7e15da502cf7ccc0f7bb7fd274b511a74779e2453e36961f09613547c706aa26ed0fc3ded55545803a3f6e4af5c3cb7ec1b47b4c6b42ce07f963033403c6331

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

    Filesize

    1KB

    MD5

    a3f957c13e6654740c98050b0b325699

    SHA1

    bfdac67f57daffd3c304079b56dc4845ebbaeda8

    SHA256

    8c074d6af83fbdeafeb3e5c72fce24986ed71870b492935904073d754baacedc

    SHA512

    b52bb56d98fe6460f3670c0a3e6fa9459796dfdd9c89b01e8ba1ee667af70ac5b1aa2b5d0579f768c0c15a6037f28cfcf0c1890d268ced544161183f5c3478cf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

    Filesize

    3KB

    MD5

    ceb8ecd806609ed69ca6163bc6b39f61

    SHA1

    ea306a96caed54ac7ea75dad03a0c74c70b4e966

    SHA256

    d42eecb98d790c3190e3de79a79005875005760d33d17d87619d15600c855fc1

    SHA512

    b07409a2199d0a2d3a36d601ece598b731f956065bed36b640390a7c358194d17f45b2e48d0e1be02feac799643dfb3ebf0dfd4f4d72cc283cdca6e3216672cc

  • memory/3896-76-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-80-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-34-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3896-37-0x00000000079F0000-0x0000000007A00000-memory.dmp

    Filesize

    64KB

  • memory/3896-38-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-39-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-41-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3896-40-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3896-42-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-57-0x0000000009B70000-0x0000000009B80000-memory.dmp

    Filesize

    64KB

  • memory/3896-58-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-59-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-60-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-61-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-62-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-63-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-64-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-65-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-67-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-68-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-66-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-69-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-70-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-72-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-73-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-74-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-71-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-75-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-36-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3896-77-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-35-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3896-78-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-92-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-79-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-82-0x0000000009B70000-0x0000000009B80000-memory.dmp

    Filesize

    64KB

  • memory/3896-83-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-84-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-85-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-86-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-93-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-81-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-91-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-90-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-89-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-88-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-87-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-94-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-96-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-97-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-99-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-98-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-95-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-100-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-101-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-102-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-103-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-104-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-105-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-106-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/3896-107-0x0000000009B70000-0x0000000009B80000-memory.dmp

    Filesize

    64KB

  • memory/3896-108-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-109-0x000000000ABC0000-0x000000000ABD0000-memory.dmp

    Filesize

    64KB

  • memory/3896-33-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3896-110-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB