Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 17:32

General

  • Target

    Re-Logic - Terraria Soundtrack - 02 Eerie.mp3

  • Size

    6.6MB

  • MD5

    24a7b3b191144d75092758ea98e67854

  • SHA1

    fb327f9c736eac739cec5eda61633a3a7b73f0ab

  • SHA256

    ef394a580cf16fb6cb488e0ee0f9b7b91ce2f7600063219fa44adbe08f4adffc

  • SHA512

    2b0927b73b32ea33f1dc4bc9361106899223f7dee5b19028b6e11e860a8b9e1d9fd042019792a905d8f82a6a2ba26f45eb11b14bd778d08c4e4f64e1154df7ae

  • SSDEEP

    196608:MLB3WRkVrZrsWpOFqRRhjTZ2HR5vBN10H:ML9OuZrsWGqRR1NWJN1W

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 02 Eerie.mp3"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 2308
      2⤵
      • Program crash
      PID:3256
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:932
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f8 0x514
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2992 -ip 2992
    1⤵
      PID:4844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      64KB

      MD5

      987a07b978cfe12e4ce45e513ef86619

      SHA1

      22eec9a9b2e83ad33bedc59e3205f86590b7d40c

      SHA256

      f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8

      SHA512

      39b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      1024KB

      MD5

      12fd0c420e4aead38a66d2ac0a5986d2

      SHA1

      3c11c387a8186a3f810df42b9351474ad6fa34fc

      SHA256

      664e07cbcd729271dccecff42f9180111e80f2235e9a0f0dd5dd205faeab0831

      SHA512

      a9449027879604a183bf07b147a54f13f17fc3c3a9374b3abccebc8b8ded4724e70a644c6e7cba6d4f2204976e74f4d5fc29e4f6e55d96489dca8d8501728c5e

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

      Filesize

      68KB

      MD5

      fc00a8cc14cac21c577f1fc2dd644a1a

      SHA1

      c54104302b33ae3c89ef0302be2424fa9c92b46f

      SHA256

      15adf387a15671130d4f6224c70ea5f07386eb143ac7fbbcba5d01723aa8a80f

      SHA512

      3f221c65a04799a6563903d3f44898f4f0d2e3f18ce5abe5513637285770f332a0467d6dafcc3db01e24a6c260022acba050bd412415379af3b98d125337bedc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

      Filesize

      498B

      MD5

      90be2701c8112bebc6bd58a7de19846e

      SHA1

      a95be407036982392e2e684fb9ff6602ecad6f1e

      SHA256

      644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

      SHA512

      d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      5433eab10c6b5c6d55b7cbd302426a39

      SHA1

      c5b1604b3350dab290d081eecd5389a895c58de5

      SHA256

      23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

      SHA512

      207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      a1bc148ddabde800f20f07219099bbf5

      SHA1

      e3182a9db0d04f700c4dbb6016f0100a9e329bda

      SHA256

      dc418747959a94375f0187bd7994043705db3b2732b9ce6864312c9fccc66912

      SHA512

      ba54c712d165994ead665ce287300c13a8e2c77c3922bd0fabcdfd145830ea48e3520ce37590ce2c77b49f5062a1df9d195fda9fe6371239950847dd37ff0c3f

    • memory/2992-30-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2992-32-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2992-31-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2992-29-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2992-28-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2992-49-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2992-27-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB