Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3El Chips A...ht.zip
windows10-1703-x64
El Chips A...th.pak
windows10-1703-x64
3El Chips A...tr.pak
windows10-1703-x64
3El Chips A...uk.pak
windows10-1703-x64
3El Chips A...ur.pak
windows10-1703-x64
3El Chips A...vi.pak
windows10-1703-x64
3El Chips A...CN.pak
windows10-1703-x64
3El Chips A...TW.pak
windows10-1703-x64
3El Chips A...es.pak
windows10-1703-x64
3El Chips A...a0.svg
windows10-1703-x64
3El Chips A...84.svg
windows10-1703-x64
3El Chips A...ed.svg
windows10-1703-x64
3El Chips A...3f.wav
windows10-1703-x64
1El Chips A...44.svg
windows10-1703-x64
3El Chips A...0e.svg
windows10-1703-x64
3El Chips A...25.svg
windows10-1703-x64
3El Chips A...85.png
windows10-1703-x64
3El Chips A...18.wav
windows10-1703-x64
6El Chips A...df.wav
windows10-1703-x64
1El Chips A...8d.svg
windows10-1703-x64
3El Chips A...a9.png
windows10-1703-x64
3El Chips A...t.json
windows10-1703-x64
3El Chips A...ain.js
windows10-1703-x64
3El Chips A...on.png
windows10-1703-x64
3El Chips A...x.html
windows10-1703-x64
4El Chips A...e.json
windows10-1703-x64
3El Chips A...ipt.js
windows10-1703-x64
3El Chips A...ob.bin
windows10-1703-x64
3El Chips A...ot.bin
windows10-1703-x64
3El Chips A...er.dll
windows10-1703-x64
3El Chips A...d.json
windows10-1703-x64
3El Chips A...-1.dll
windows10-1703-x64
3Analysis
-
max time kernel
1782s -
max time network
1591s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
El Chips Ad Custom Night.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
El Chips Ad Custom Night/locales/th.pak
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
El Chips Ad Custom Night/locales/tr.pak
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
El Chips Ad Custom Night/locales/uk.pak
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
El Chips Ad Custom Night/locales/ur.pak
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
El Chips Ad Custom Night/locales/vi.pak
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
El Chips Ad Custom Night/locales/zh-CN.pak
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
El Chips Ad Custom Night/locales/zh-TW.pak
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
El Chips Ad Custom Night/resources.pak
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
El Chips Ad Custom Night/resources/app/assets/0a52bc28f06569c489043a27c1e0dba0.svg
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
El Chips Ad Custom Night/resources/app/assets/228ea95da153e2739265b8d7ff154084.svg
Resource
win10-20240611-en
Behavioral task
behavioral12
Sample
El Chips Ad Custom Night/resources/app/assets/3339a2953a3bf62bb80e54ff575dbced.svg
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
El Chips Ad Custom Night/resources/app/assets/373adfc30b0253bff90c494b9606173f.wav
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
El Chips Ad Custom Night/resources/app/assets/7a9a594b3ed9f560fa855f10cdc4cf44.svg
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
El Chips Ad Custom Night/resources/app/assets/7ebc43c79f1bcdd30d6754865669bf0e.svg
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
El Chips Ad Custom Night/resources/app/assets/8aff245bf658480a1f25c74db9a9be25.svg
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
El Chips Ad Custom Night/resources/app/assets/a596f06dd48878823f16d450b1f91585.png
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
El Chips Ad Custom Night/resources/app/assets/acd9351c7c86a9dc483b5235835e6e18.wav
Resource
win10-20240611-en
Behavioral task
behavioral19
Sample
El Chips Ad Custom Night/resources/app/assets/bb6039e2d2b80f0ebed05ce75a7578df.wav
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
El Chips Ad Custom Night/resources/app/assets/ccde3b77178fc091b888b485ab9d1a8d.svg
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
El Chips Ad Custom Night/resources/app/assets/e917bbe2ea2a7cd894b74de8a9dbd1a9.png
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
El Chips Ad Custom Night/resources/app/assets/project.json
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
El Chips Ad Custom Night/resources/app/electron-main.js
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
El Chips Ad Custom Night/resources/app/icon.png
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
El Chips Ad Custom Night/resources/app/index.html
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
El Chips Ad Custom Night/resources/app/package.json
Resource
win10-20240611-en
Behavioral task
behavioral27
Sample
El Chips Ad Custom Night/resources/app/script.js
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
El Chips Ad Custom Night/snapshot_blob.bin
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
El Chips Ad Custom Night/v8_context_snapshot.bin
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
El Chips Ad Custom Night/vk_swiftshader.dll
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
El Chips Ad Custom Night/vk_swiftshader_icd.json
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
El Chips Ad Custom Night/vulkan-1.dll
Resource
win10-20240404-en
General
-
Target
El Chips Ad Custom Night/resources/app/assets/acd9351c7c86a9dc483b5235835e6e18.wav
-
Size
6.4MB
-
MD5
acd9351c7c86a9dc483b5235835e6e18
-
SHA1
8a44f8521459a62fa2a92c3fa580b2b2c018cba2
-
SHA256
f55acf452b2fbdd0e7d9419b366b418669c61d41a1879e813dca3313a7666587
-
SHA512
85b95435fd0dbe4444ad1c0ccb2ed52e1c5550fa76454ca114ca2e01ddd0183e9a0e1590514fc28abda3b9957f1f4057353413523a4963a22e4c985ff2bcfdf2
-
SSDEEP
196608:4MdASTLKts/hU/346D8BaKRtPLMZwFJjgfqge9yT90vn8:4MdAPts/S/wQKfoa6fAw5W8
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4996 wmplayer.exe Token: SeCreatePagefilePrivilege 4996 wmplayer.exe Token: SeShutdownPrivilege 1508 unregmp2.exe Token: SeCreatePagefilePrivilege 1508 unregmp2.exe Token: 33 1360 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1360 AUDIODG.EXE Token: SeShutdownPrivilege 4996 wmplayer.exe Token: SeCreatePagefilePrivilege 4996 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4996 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4936 4996 wmplayer.exe 70 PID 4996 wrote to memory of 4936 4996 wmplayer.exe 70 PID 4996 wrote to memory of 4936 4996 wmplayer.exe 70 PID 4936 wrote to memory of 1508 4936 unregmp2.exe 71 PID 4936 wrote to memory of 1508 4936 unregmp2.exe 71
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\El Chips Ad Custom Night\resources\app\assets\acd9351c7c86a9dc483b5235835e6e18.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
- Drops file in Windows directory
PID:4740
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5f9f4722151fed2266c509cb1a7263d7a
SHA105ab0da306bb05c35f9be79a76427d2f060eccb5
SHA25681538fc414f338df89d0de9a632f3c3b16e03dfe3abb49561cc053694dd49b42
SHA512cc7d1b99a1ea67559ffbbbc230a4a3f1dd01e386394b10e10ce81dbcbabd5455efb12ebc02298c3c96c6a6f559f538b2200fcd1bfd11d79e374be888a7cd6087
-
Filesize
1024KB
MD53582625250fa63613525d3ef8c624831
SHA1241dc0cc5ede704253019e46cc48310fd6c170cf
SHA25660492f2967add34c0bdad17e608878fcb212c82784f9947b86b3a6b3ca3745da
SHA51220f16b21cbd9ba13b397a45c978fe3c9fc5937cd0f62178b7e8941f57f4ede0ad8aacffc720fd6fbb5f7da53d852f8f80a0788721f5f614d18728b47be32746b
-
Filesize
68KB
MD54ea7b0065431a19645020b12c233bbb4
SHA17c84be16e88f4e24889af0063a5fb70c7288f047
SHA256a8ff1cd5392dbd7abd6ff4739aa68b719f514632bd286b553e0d0fa117bc5caa
SHA51262fb02ff1020963d704bef1780afd564ed567dd785f7d8a63495762add2e8f86c95862fb1dafa63d38cb1675bfdb55d217f180dcf90311f3172b61d984758bf6
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5f32a618d344a70965cf79c723db806e3
SHA1f723525b3721e2a4c82d211802471ff1d0cd456d
SHA256ee43e5689ce0de74e603323031b9ba3cd29589e3195bec62642c85bccacbc6ee
SHA5125aacc3b68fd97fc7ef6eff2faa1bf9a73cc4771cb5c46ee67b381714d21a2295285c3189a60cad947eb1cced4499bec97ee9b71d9e373f8f953edf8100a88440