Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
6Beholder_ ...re.zip
windows7-x64
1Beholder_ ...re.zip
windows10-2004-x64
1Android/ob...ee.zip
windows7-x64
1Android/ob...ee.zip
windows10-2004-x64
1assets/Logo/logo1.mp4
windows7-x64
1assets/Logo/logo1.mp4
windows10-2004-x64
6assets/Logo/logo2.mp4
windows7-x64
1assets/Logo/logo2.mp4
windows10-2004-x64
6assets/Uni...n.json
windows7-x64
3assets/Uni...n.json
windows10-2004-x64
3assets/bin...000000
windows7-x64
1assets/bin...000000
windows10-2004-x64
1assets/bin...6cd535
windows7-x64
1assets/bin...6cd535
windows10-2004-x64
1assets/bin...23b72b
windows7-x64
1assets/bin...23b72b
windows10-2004-x64
1assets/bin...247a10
windows7-x64
1assets/bin...247a10
windows10-2004-x64
1assets/bin...45cca7
windows7-x64
1assets/bin...45cca7
windows10-2004-x64
1assets/bin...65105d
windows7-x64
1assets/bin...65105d
windows10-2004-x64
1assets/bin...6d79f6
windows7-x64
1assets/bin...6d79f6
windows10-2004-x64
1assets/bin...9897ac
windows7-x64
1assets/bin...9897ac
windows10-2004-x64
1assets/bin...7bf85e
windows7-x64
1assets/bin...7bf85e
windows10-2004-x64
1assets/bin...29fc78
windows7-x64
1assets/bin...29fc78
windows10-2004-x64
1assets/bin...04a31f
windows7-x64
1assets/bin...04a31f
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
Beholder_ Adventure_2.6.260_APKPure.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Beholder_ Adventure_2.6.260_APKPure.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Android/obb/com.creativemobile.beholderfree/main.260.com.creativemobile.beholderfree.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Android/obb/com.creativemobile.beholderfree/main.260.com.creativemobile.beholderfree.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
assets/Logo/logo1.mp4
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
assets/Logo/logo1.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
assets/Logo/logo2.mp4
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
assets/Logo/logo2.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
assets/UnityServicesProjectConfiguration.json
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
assets/UnityServicesProjectConfiguration.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
assets/bin/Data/0000000000000000f000000000000000
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
assets/bin/Data/0000000000000000f000000000000000
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
assets/bin/Data/000f5b1515d06f1449968c77136cd535
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
assets/bin/Data/000f5b1515d06f1449968c77136cd535
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
assets/bin/Data/001a40d38db2e2e45af7fe681123b72b
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
assets/bin/Data/001a40d38db2e2e45af7fe681123b72b
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
assets/bin/Data/002130a1018259c40b40ef305d247a10
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
assets/bin/Data/002130a1018259c40b40ef305d247a10
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
assets/bin/Data/003041528ced7e9489f9c9d8dc45cca7
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
assets/bin/Data/003041528ced7e9489f9c9d8dc45cca7
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
assets/bin/Data/005e69c442679cd43814f2cd5c65105d
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
assets/bin/Data/005e69c442679cd43814f2cd5c65105d
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
assets/bin/Data/00691a9df77177b43a7767a4826d79f6
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
assets/bin/Data/00691a9df77177b43a7767a4826d79f6
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
assets/bin/Data/0078594822131ad49b77961bac9897ac
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
assets/bin/Data/0078594822131ad49b77961bac9897ac
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
assets/bin/Data/0080368375c37164e9e7f29b7b7bf85e
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
assets/bin/Data/0080368375c37164e9e7f29b7b7bf85e
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
assets/bin/Data/00c6d7022de18f046a9dfc212129fc78
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
assets/bin/Data/00c6d7022de18f046a9dfc212129fc78
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
assets/bin/Data/00f43663d5dcfd7438bc2ec14904a31f
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
assets/bin/Data/00f43663d5dcfd7438bc2ec14904a31f
Resource
win10v2004-20240802-en
General
-
Target
assets/Logo/logo1.mp4
-
Size
1.3MB
-
MD5
7dade903ec1d5adf3599b99fd419ddbc
-
SHA1
790aebf6ef1ba0b0b72fb4256e88ec4de771d9cc
-
SHA256
8ee42d18a101f3fa6b189f528009dea40ce3440477154015f0d75aeb82f02aa0
-
SHA512
0f4294139eb32b26c44548451a9330ff54ab138cd12119533db7f618b42d03a22e1964e6f5ad1d18ff560319baa67ee1622691c0426606240a77d2df971de65a
-
SSDEEP
24576:za0BU5sqc6ZTtDu6HvFFoUZB01a37IAwDIaZte34G0ulgORGL0Z9UDNUA5ueX:zLmhd7HPFFoYZ37IAwDmomxGoZ9qOA55
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{78C34E0F-CB33-4467-B138-DBF497F2337B} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3952 unregmp2.exe Token: SeCreatePagefilePrivilege 3952 unregmp2.exe Token: SeShutdownPrivilege 4224 wmplayer.exe Token: SeCreatePagefilePrivilege 4224 wmplayer.exe Token: 33 1848 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1848 AUDIODG.EXE Token: SeShutdownPrivilege 4224 wmplayer.exe Token: SeCreatePagefilePrivilege 4224 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4224 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4224 wrote to memory of 2488 4224 wmplayer.exe 88 PID 4224 wrote to memory of 2488 4224 wmplayer.exe 88 PID 4224 wrote to memory of 2488 4224 wmplayer.exe 88 PID 2488 wrote to memory of 3952 2488 unregmp2.exe 89 PID 2488 wrote to memory of 3952 2488 unregmp2.exe 89
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\assets\Logo\logo1.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4300
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x4dc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD59a4b26009d09d9f95439e2a67d757059
SHA1a6873025b6926db1007160e6a1be5f4ab17dd4e6
SHA2569d9488050435cfab651a5d8d8fd315ca08c1ac8cd902077c49c55fa8d4019263
SHA512e53d3e9c42ff23270da400a3debeae9dd4864648bfcd4f5e71ea6e6c8152566a2256824b84bb3bacfcd045738d70c89d73bcc85c16659e641e994ad7099aa57a
-
Filesize
1024KB
MD5436c2bbd78356fc45a0a005aa1b2c2b9
SHA16cd4955c0b3c93ce4820a1eabebda888e757370b
SHA25690b6a5b9cb55382a97ec61b1a867c4b827b432e52cdbb4660b3ab7098c7dac93
SHA5126dedb5ec85c53e543e5ef06ec01e0c02fb4e686d902e61019185379caee656dfcdc4276e213e56342af7952adee7c80b1d5ac71681f9df76dad32036da269afd
-
Filesize
68KB
MD5f34df122de99ce2fa6ca9bc122a58c58
SHA1163f84ac74e12ec75cc5dbf891395aa078e0d05d
SHA2568715a6c88e7d9359f81db359d185646159e62f45019d5ae2cbd3128f1a2d7157
SHA5126da5eebe4a5176fbec12dc0d47061b83d88eabbcb1245c5dbd3625e954b975755b755c212dbf5425818ec1d88c05524830802562a2a238808b670c597fdd9a19
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD5593d07475fc5ea036d3719369e4dac11
SHA13caa0eb6eaf9ef59ce0b4e1f88a6d74a34b9dd34
SHA2567e94fda3d22600a2886bc90e05a109c5a44a7effc60d58214420149a86ae7581
SHA5124f7d3d439d25ed17e9f3cf82d13708eb6442c74caa7e7b107c917307de75334edc1289b0fac3a63b0801e574306714b9b3ecd7e6d70bc68de5e689ac6dd29544