Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/08/2024, 21:06 UTC

General

  • Target

    MailRanger/how to mail_1.mp4

  • Size

    102.5MB

  • MD5

    c3fd4ba9f6aaaa629dfd41778be61eab

  • SHA1

    d9c6c995d4db387c763aaf0dda3ea41ca8904710

  • SHA256

    0bda1925009f26fd58dcd3376c2da5b28753c6f1f022a8388ff928825d03ebbf

  • SHA512

    308a695d6c61deed48adbe279bebbdb59f302c152b24321744de3a2202941289ddf79b0c6f379c92c71abe043132421aa65da5b876d056efd006cb0f725b3be3

  • SSDEEP

    3145728:nQi1aKHLGIxyq6pEn/Fqs49QkP8vi8FsBwU:nQrNq0EcV9lPz8NU

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\MailRanger\how to mail_1.mp4"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:240
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4608
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:4764
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004D8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3744

Network

  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    ctldl.windowsupdate.com
    Remote address:
    8.8.8.8:53
    Request
    ctldl.windowsupdate.com
    IN A
    Response
    ctldl.windowsupdate.com
    IN CNAME
    ctldl.windowsupdate.com.delivery.microsoft.com
    ctldl.windowsupdate.com.delivery.microsoft.com
    IN CNAME
    wu-b-net.trafficmanager.net
    wu-b-net.trafficmanager.net
    IN CNAME
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.56.45
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.100
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.36
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.22
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.23
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.98
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.21
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    IN A
    217.20.58.37
  • flag-us
    DNS
    23.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.236.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    nexusrules.officeapps.live.com
    Remote address:
    8.8.8.8:53
    Request
    nexusrules.officeapps.live.com
    IN A
    Response
    nexusrules.officeapps.live.com
    IN CNAME
    prod.nexusrules.live.com.akadns.net
    prod.nexusrules.live.com.akadns.net
    IN A
    52.111.236.23
  • flag-us
    DNS
    14.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.173.189.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    283 B
    812 B
    4
    4

    DNS Request

    22.160.190.20.in-addr.arpa

    DNS Request

    73.144.22.2.in-addr.arpa

    DNS Request

    ctldl.windowsupdate.com

    DNS Response

    217.20.56.45
    217.20.58.100
    217.20.58.36
    217.20.58.22
    217.20.58.23
    217.20.58.98
    217.20.58.21
    217.20.58.37

    DNS Request

    23.236.111.52.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    218 B
    443 B
    3
    3

    DNS Request

    58.55.71.13.in-addr.arpa

    DNS Request

    nexusrules.officeapps.live.com

    DNS Response

    52.111.236.23

    DNS Request

    14.173.189.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    896KB

    MD5

    bf6ac69ca9c916d15779da9f2b0ea326

    SHA1

    7a46965ca1224a4ecd4839ab11e2e8f4739678cd

    SHA256

    5e1116c11f2878f660a8491066012ad5c963ea72e6e6f6cae866708d47047530

    SHA512

    c8d8bc551d5812861b395b7cef39640f268e2a3289ed711e678f371214fa49fadc7b8e1dc78b62017397f3e1e037b8f26d54dbfb1ba422b7a7492907c32fb35a

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    64bc168d0fe7a339455ecc33d0d61778

    SHA1

    ee6dfda590f6a4a5a4c3c4c334d3312b114bff24

    SHA256

    0d1df85a34ed7702ed2a7f2c232951e8b52a663cd2a46f73f91a24b7d4707542

    SHA512

    692d8655b806e475ffd51a9327faf209123006e011545337cdf5d78379c86899b072b60feb13bab600a3acfc0559fecd7fc0740114e0807d2e9049a6533ce2d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    5433eab10c6b5c6d55b7cbd302426a39

    SHA1

    c5b1604b3350dab290d081eecd5389a895c58de5

    SHA256

    23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

    SHA512

    207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    aa5cd3da3b1438a399f84a6961c8448b

    SHA1

    3d50fc30d41e28c6ad77bf82685113f5046d6530

    SHA256

    0b38af3151b519ac95fbac723d136363ddf004ec88b39259785c0287a7f8dab6

    SHA512

    5c79b065f2cf98daea622a2621b56add7903c7077161dd3982a779ef6ca34417e922a01da63df073f1cea8efe894b97a0bef71eaaf8b0b35b4243412cf086a2f

  • memory/1000-31-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/1000-33-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/1000-30-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/1000-34-0x0000000009690000-0x00000000096A0000-memory.dmp

    Filesize

    64KB

  • memory/1000-38-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/1000-37-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/1000-39-0x0000000009720000-0x0000000009730000-memory.dmp

    Filesize

    64KB

  • memory/1000-36-0x0000000009720000-0x0000000009730000-memory.dmp

    Filesize

    64KB

  • memory/1000-35-0x0000000009720000-0x0000000009730000-memory.dmp

    Filesize

    64KB

  • memory/1000-32-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.