Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Terraria_1.4.4.9.zip
windows7-x64
7Terraria_1.4.4.9.zip
windows10-2004-x64
1Terraria_1...p3.zip
windows7-x64
1Terraria_1...p3.zip
windows10-2004-x64
1AlbumArtSmall.jpg
windows7-x64
3AlbumArtSmall.jpg
windows10-2004-x64
3Folder.jpg
windows7-x64
3Folder.jpg
windows10-2004-x64
3Re-Logic -...ay.mp3
windows7-x64
1Re-Logic -...ay.mp3
windows10-2004-x64
6Re-Logic -...ie.mp3
windows7-x64
1Re-Logic -...ie.mp3
windows10-2004-x64
6Re-Logic -...ht.mp3
windows7-x64
1Re-Logic -...ht.mp3
windows10-2004-x64
6Re-Logic -...en.mp3
windows7-x64
1Re-Logic -...en.mp3
windows10-2004-x64
6Re-Logic -...nd.mp3
windows7-x64
1Re-Logic -...nd.mp3
windows10-2004-x64
6Re-Logic -... 1.mp3
windows7-x64
1Re-Logic -... 1.mp3
windows10-2004-x64
6Re-Logic -...le.mp3
windows7-x64
1Re-Logic -...le.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Re-Logic -... 2.mp3
windows7-x64
1Re-Logic -... 2.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Terraria_1.4.4.9.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Terraria_1.4.4.9.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AlbumArtSmall.jpg
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
AlbumArtSmall.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Folder.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Folder.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win10v2004-20241007-en
General
-
Target
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
-
Size
5.7MB
-
MD5
256d635c2022057c4e4ac300f2ddf810
-
SHA1
d174e7b77d1e64196ea0a947ea68ff4bbe0c303a
-
SHA256
51faca3e7cb2e8d9d41350a1eaa874c6c7e925859c22d4c1fe2882dff3c85ed9
-
SHA512
9d4c8dae941ffd3674460ef77e579a08374d61b29b56a5d1a3255a7288d9dfb364a27082783cf164e24f6c089c1a523ac8e78f63736828ddf65ed92f92e88f03
-
SSDEEP
98304:9LBYMZtW4uBqB0mleXGDjeRYLL/hVV8W0bFTzy3l5hhSfFQHQU2oya:9LBzcBqBJeR8L/VO45XaFQhua
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{5526DFB3-DA49-4AA6-A424-5AE3EC67E5F2} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2360 wmplayer.exe Token: SeCreatePagefilePrivilege 2360 wmplayer.exe Token: SeShutdownPrivilege 3948 unregmp2.exe Token: SeCreatePagefilePrivilege 3948 unregmp2.exe Token: 33 3008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3008 AUDIODG.EXE Token: SeShutdownPrivilege 2360 wmplayer.exe Token: SeCreatePagefilePrivilege 2360 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2436 2360 wmplayer.exe 85 PID 2360 wrote to memory of 2436 2360 wmplayer.exe 85 PID 2360 wrote to memory of 2436 2360 wmplayer.exe 85 PID 2436 wrote to memory of 3948 2436 unregmp2.exe 86 PID 2436 wrote to memory of 3948 2436 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2604
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD529bd18035ac3468ed8ee41ba90d66f22
SHA136e76825c5aff3f599ec16a85b14ee487595a69d
SHA256eca587e1d30a5a9c65a7f3d69272ebc2890a0ec954d1ee4ad7d5ac45bd95ddc8
SHA512b1b8a231de045c227d430c9edd5996b882153fd848fc319ba2dfbfc7aa309bce8a3551889f735f6de6d6fdfc09a1ffad4dcb4fd7ff2d4017eeb2c97f7a83f7d0
-
Filesize
1024KB
MD5c185962d10c3cf654380b8071a722b99
SHA18b115b79c5fda3c7579c7f7588952abfb3100328
SHA2564a740a4802934330f9cb72b58141db13834b2f35c945e57dc62955e8f7c856f4
SHA512bd447212c072c5720919570e07c1a0c796b774e4ce735f44d60f75e2f440b9c4a3648d97fd95a1b64e15a9a02b078f11387d3e166adb03da956bf3ee526b789d
-
Filesize
68KB
MD531bc50e16c691f67ecd708117d175332
SHA1d7bd76e8b7a2881fcf659f9a7e43354bcce39f64
SHA256465d546d41847cd0f168732539a4e8def582a1c2490d0927ac284e854c2ad54f
SHA512eddaf00ee7d1f3ad6807d0bb73ccdaa2e593cd47d9694f9e1ec2b744c4ff8f615d6255f06203cbd66221dfd88faa02a8d322a477c5fad069254fd1ac86486941
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD538e3a047d4588780bef93b999d651b8d
SHA1a8c1af44a91aa475c32fd1ed0362ed888d752f79
SHA2569b742d5ee09ddeaf599069c97aaf3877eb25cbf43a149024ae1e5cb2b5151d93
SHA512655bda9b8b151fe18a1f96e91a1f4c8965fdf304dc72acd8fdf0187a90880f0bb8c43bcaecf45de9e23ffec36427ccde05fbd8817fe798b228fa3d3b4f0e6201