Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Terraria_1.4.4.9.zip
windows7-x64
7Terraria_1.4.4.9.zip
windows10-2004-x64
1Terraria_1...p3.zip
windows7-x64
1Terraria_1...p3.zip
windows10-2004-x64
1AlbumArtSmall.jpg
windows7-x64
3AlbumArtSmall.jpg
windows10-2004-x64
3Folder.jpg
windows7-x64
3Folder.jpg
windows10-2004-x64
3Re-Logic -...ay.mp3
windows7-x64
1Re-Logic -...ay.mp3
windows10-2004-x64
6Re-Logic -...ie.mp3
windows7-x64
1Re-Logic -...ie.mp3
windows10-2004-x64
6Re-Logic -...ht.mp3
windows7-x64
1Re-Logic -...ht.mp3
windows10-2004-x64
6Re-Logic -...en.mp3
windows7-x64
1Re-Logic -...en.mp3
windows10-2004-x64
6Re-Logic -...nd.mp3
windows7-x64
1Re-Logic -...nd.mp3
windows10-2004-x64
6Re-Logic -... 1.mp3
windows7-x64
1Re-Logic -... 1.mp3
windows10-2004-x64
6Re-Logic -...le.mp3
windows7-x64
1Re-Logic -...le.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Re-Logic -... 2.mp3
windows7-x64
1Re-Logic -... 2.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Terraria_1.4.4.9.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Terraria_1.4.4.9.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AlbumArtSmall.jpg
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
AlbumArtSmall.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Folder.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Folder.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win10v2004-20241007-en
General
-
Target
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
-
Size
5.0MB
-
MD5
6a2e2a28b9a6a0e91390d089d6eef044
-
SHA1
47dcc58d8b487e66318c8a452a4aa9652b57fb21
-
SHA256
d8c5fc729213ada6ef9b3e8c8ed278181dc50ec9c308228acdee931ecccf2b32
-
SHA512
1af172dacb858ba2b6aba3e872e136cb5a19ff8a9b03f27cbd1c9470614827c79cbfd18360712891b4c5565cccff5cc22b81656502f60236b560c07aa7c0c810
-
SSDEEP
98304:GLBYMZ0F2KhKv5OBZjgm1OlwHJgfoHKA3IfFdLlpH+ffDNz:GLB+F5pV1iwHMc36Mr9
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{CB79C559-4F17-434E-A6C9-4DDFF321957C} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3784 wmplayer.exe Token: SeCreatePagefilePrivilege 3784 wmplayer.exe Token: SeShutdownPrivilege 4112 unregmp2.exe Token: SeCreatePagefilePrivilege 4112 unregmp2.exe Token: 33 4764 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4764 AUDIODG.EXE Token: SeShutdownPrivilege 3784 wmplayer.exe Token: SeCreatePagefilePrivilege 3784 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3784 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3784 wrote to memory of 3984 3784 wmplayer.exe 85 PID 3784 wrote to memory of 3984 3784 wmplayer.exe 85 PID 3784 wrote to memory of 3984 3784 wmplayer.exe 85 PID 3984 wrote to memory of 4112 3984 unregmp2.exe 86 PID 3984 wrote to memory of 4112 3984 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1856
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD51d701536082a5ac5da8b18cca2859b40
SHA1404697bc4835916c2bdc465b9f9891235daae951
SHA2567b3567fd808376d4147def8c2bbfddcc5e284a720078c18cf299a8dd6900d12c
SHA5129820419abe88f28d63b066473088a72d4c18fe305e04b517188b537a9070313b2d6fac4b9da7ee0d01223571c823a2e282f0932e802e24f4a8a6800b473c1406
-
Filesize
68KB
MD5bbaa69dfd0d9338f506d45b087196440
SHA104d33ee8473eb1195ec64d66b1d96fc1b66689e1
SHA256295ec1165d5e83779e884ba5bd706294cf34614fb5d9fc6ba5a9deb5e8ea1759
SHA512a854a5fbaee7c1c5f47757a37eb73d343eb235a03305cbbe9aa9953edb81eb80c5708970a352d75e279f82ae7a809b308461cca9853336016879d4401cbdc612
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5384c2fdacb03c07b26d919473c1033e3
SHA1184a3c5a5f4b3739a3a03b500dbd00421f18ec4c
SHA25688771b58c7a00656187410b398bec84dcb7bfdb0067522cbb15870a4651ef006
SHA512ebb9da1ce035d52c4c7f419fda1e5e61340b1f9194c1bcef443c934d307fce3140a3bab1437bcc772051f57fb2dca874105d2a40c16cdf9785026a70963edff3