Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1Roblox-Mas...in.zip
windows7-x64
1Roblox-Mas...in.zip
windows10-2004-x64
15df42da4-c...dc.mp4
windows7-x64
15df42da4-c...dc.mp4
windows10-2004-x64
6Roblox-Mas...Ban.py
windows7-x64
3Roblox-Mas...Ban.py
windows10-2004-x64
3Roblox-Mas...DME.md
windows7-x64
3Roblox-Mas...DME.md
windows10-2004-x64
3Roblox-Mas...es.txt
windows7-x64
1Roblox-Mas...es.txt
windows10-2004-x64
3Roblox-Mas...ain.py
windows7-x64
3Roblox-Mas...ain.py
windows10-2004-x64
3Roblox-Mas...xy.txt
windows7-x64
1Roblox-Mas...xy.txt
windows10-2004-x64
1Roblox-Mas...up.bat
windows7-x64
1Roblox-Mas...up.bat
windows10-2004-x64
1Roblox-Mas...ts.txt
windows7-x64
1Roblox-Mas...ts.txt
windows10-2004-x64
1python-3.1...64.exe
windows7-x64
4python-3.1...64.exe
windows10-2004-x64
4Analysis
-
max time kernel
1172s -
max time network
1156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
Roblox-Mass-Report-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Roblox-Mass-Report-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
5df42da4-c2fc-4c88-b987-7b53c91958dc.mp4
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
5df42da4-c2fc-4c88-b987-7b53c91958dc.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Roblox-Mass-Report-main/RBXBan.py
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Roblox-Mass-Report-main/RBXBan.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Roblox-Mass-Report-main/README.md
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Roblox-Mass-Report-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Roblox-Mass-Report-main/cookies.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Roblox-Mass-Report-main/cookies.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Roblox-Mass-Report-main/main.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Roblox-Mass-Report-main/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Roblox-Mass-Report-main/proxy.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Roblox-Mass-Report-main/proxy.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Roblox-Mass-Report-main/setup.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Roblox-Mass-Report-main/setup.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Roblox-Mass-Report-main/useragents.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Roblox-Mass-Report-main/useragents.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
python-3.11.8-amd64.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
python-3.11.8-amd64.exe
Resource
win10v2004-20240802-en
General
-
Target
5df42da4-c2fc-4c88-b987-7b53c91958dc.mp4
-
Size
6.8MB
-
MD5
f9c6fade0d8e712b80338b303a912ab6
-
SHA1
ba776164a624987acf084f0707b42c9ab46564ec
-
SHA256
807a27e3ea56dc1593874acfb622208e9a9966c80411f8608ce5425c2ec3cd0c
-
SHA512
e3833a1498598666951197a1da66babe13b31eec3552cb63ebdcec620708b581426082b4160ff2cd0d9446c39d1fef939c893e0e1897d2cd456051d14e129c24
-
SSDEEP
196608:Z/aU37CDScNEhMd3Zk4wScVr+rfbVhESiue3E05Pcfow377K8:Z+D9d3Zk4wVIjVhzJWsfx77K8
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-656926755-4116854191-210765258-1000\{69C3B736-69FC-49B3-89E1-47FFA2EDAA53} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 4652 wmplayer.exe Token: SeCreatePagefilePrivilege 4652 wmplayer.exe Token: SeShutdownPrivilege 5084 unregmp2.exe Token: SeCreatePagefilePrivilege 5084 unregmp2.exe Token: SeShutdownPrivilege 4652 wmplayer.exe Token: SeCreatePagefilePrivilege 4652 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4652 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4652 wrote to memory of 408 4652 wmplayer.exe 85 PID 4652 wrote to memory of 408 4652 wmplayer.exe 85 PID 4652 wrote to memory of 408 4652 wmplayer.exe 85 PID 408 wrote to memory of 5084 408 unregmp2.exe 86 PID 408 wrote to memory of 5084 408 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\5df42da4-c2fc-4c88-b987-7b53c91958dc.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5be7927b883bfdfab4d7820c6f5f3661b
SHA12e43fc9b55fe625e568a01638df926eda12dfb4a
SHA256ed853a4fd91e0cf2fdf173de222e0739ba3fe52f139876aa7bcf7f3b05e4d629
SHA512e908e01078a8016250382efb2393550712a393aad6e59fbf13ca1f522b90f67e2653e01d1e918f91846c7e7ac06ae3db3adf26c202178c202f6518e940112d51
-
Filesize
384KB
MD554bf4aa53f3e467cc16b8eeb2d64548e
SHA1b5c14a1c3e8e270dd86f20f732ba3be0330ee79f
SHA256824f8d90356a28148c97943ff976c1f68cf9ce42227c8c7ee682d1395ef47f7b
SHA51237f60da444255ef87b7c5d1ca1dbe18784c09d2f2c9abe2b04a55e1d3ae016237674d08e5b5a24c66104c82af77b1adf0fced68d53b004143930537e49db77ca
-
Filesize
1024KB
MD5cd183d58a39a3697c03e00772347f81d
SHA1248188ba967440c2980ef67ba206f38e43c717fd
SHA2567507f80ab790afd9d8243178331527912776c5458b3c748ab0a4591f833c65ba
SHA512ebdf8731b9548fe227c0530eb12ec79138632002167b6de04291e14eeb3c90247318b21d7f4dc1994286f4d79b54358608dfab019a561e384fe35959bde75158
-
Filesize
68KB
MD5749f13b99d078623c428f3234b2c7f35
SHA1bb57063bd3985815db8ca52f9f3c5380f48985fc
SHA2560a4e4e569db33555ed5b632e9effc22c715abbbf11e6fcb5ef6501c08be3737a
SHA5125ac11804d959246ae5a5ee348241118f4292bc0e0c34a24d7ac5c0cf51598a6a6d725064f6190c0b907221f90c5ce8fe8d6ab7dfae7469a06c703aec065ea75a
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD519358af8483117da9c97cad80c45aee5
SHA1fd12159c7f3a830d0759a0882823cbb7ff61ecd1
SHA256249977bd99b0a4026ef37e0070b94f2d49791002cfee021c7101ad448352bcbb
SHA5122ca2409a4909d8a719cd3c4d65595439da8a83b1a75fe1dc0b72bd23a273a7758fa5093650239f6acf22de66ad620bbe3bcfba6e50022208c8197a8f57fa8140