Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 17:32

General

  • Target

    Re-Logic - Terraria Soundtrack - 05 Underground.mp3

  • Size

    7.3MB

  • MD5

    30edb003661a6112e976de0630655c68

  • SHA1

    637bb31b86d2527c95373882c77563a12770d4b4

  • SHA256

    d53fe845a597521c042594820a921e80889a18ef8d4426876c113a44955245f3

  • SHA512

    380dbb8b422f81431e51993b65c6d0e3d61517808666e1c1ddefeab97277dba41e32ec8482953716fb1f0c8e916d0d1e9aed725a1ecb2543c1cbdc34b2670c00

  • SSDEEP

    196608:TLBOISpyB3ZhJKTUSy1ud3uysGePzW08XV9hCnar:TLsjoBpGISRsGe7W00fr

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 05 Underground.mp3"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\system32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:3184
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:3820
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x518 0x51c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    256KB

    MD5

    feea2a83b0f7461e28c8455a5f615a7c

    SHA1

    f2275376c850c898536ca9b7f25bfc3e6b49f348

    SHA256

    368d24108f6dcddfd6a1fb3077578dd3d630565f76db69c9a1a4202c07b20f98

    SHA512

    9f9c56b7197e7f8d6cacf93533d8cf34d5e03df7b3e6f983bf1a421d39eb229202f25148e0ce47074eecfd5a751e77c96ef0bef1cfe146bdbe2207a8fe542c59

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    aef1cd38079dc825bdb5c9aca52d5879

    SHA1

    3f68af408c783c2d17fa14c4e3413fbcfec62a6b

    SHA256

    fb1a893c626bfa7957bad48533a78062a0d82c1b8af6552b2d0ab8872b729814

    SHA512

    8efb0e8e508b518e10ff6e40c6fd272c903840b7365b9225c1bd49770de45c9abad85259e0b5fe44d505229aa593a5c23298901fe72fae9b751d3e746adf9b68

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

    Filesize

    68KB

    MD5

    a4b1ec4f1e2cf5bcea32ea2a79ef5b4f

    SHA1

    ea2681429b7ae1def28fd295b0148666381e6e45

    SHA256

    41d6c3fcdbbc9920fa2da4f6aec571797057c27a391f6dbe155efe92e8b22dc6

    SHA512

    29008bcc8b409b0f613f02cfb15355a199eeabcdaaba366d4438770f7c9d54766fe3955088a72d4580d5bfcc53b516d73acd8838f42e78712c587ebc171096bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

    Filesize

    498B

    MD5

    90be2701c8112bebc6bd58a7de19846e

    SHA1

    a95be407036982392e2e684fb9ff6602ecad6f1e

    SHA256

    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

    SHA512

    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    7b4d646a1e307f172aad7c7cb8e478af

    SHA1

    6c7fd3613a77dd982d105fd2db8a34c6cc0948ee

    SHA256

    69e7dcd9634a21e78809bcf2454fbe052120675a7a7ce291db2d49463fc731fe

    SHA512

    ae2aeb01f765b894e772021602faf0729b228f6a84308d21a01147e18a5e729fc3b99fcbfcdf1b8170b55d919b1d73b347049696044244b13aa2a6b245876f14

  • memory/2284-34-0x0000000005230000-0x0000000005240000-memory.dmp

    Filesize

    64KB

  • memory/2284-32-0x0000000005230000-0x0000000005240000-memory.dmp

    Filesize

    64KB

  • memory/2284-31-0x0000000005230000-0x0000000005240000-memory.dmp

    Filesize

    64KB

  • memory/2284-33-0x0000000005230000-0x0000000005240000-memory.dmp

    Filesize

    64KB

  • memory/2284-36-0x0000000005230000-0x0000000005240000-memory.dmp

    Filesize

    64KB

  • memory/2284-35-0x0000000005230000-0x0000000005240000-memory.dmp

    Filesize

    64KB

  • memory/2284-42-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB

  • memory/2284-44-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-45-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-47-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-48-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-49-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-50-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-52-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-51-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-55-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-54-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-53-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-58-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-60-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-61-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-62-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-63-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-59-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-64-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-65-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-66-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-67-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-71-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB

  • memory/2284-70-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-69-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-73-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-68-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-75-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-74-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-76-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-78-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-77-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-80-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-81-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-83-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-82-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-79-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-84-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-86-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-87-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-90-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-89-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-88-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-94-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-93-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-98-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB

  • memory/2284-99-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-97-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-96-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-95-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-92-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-91-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-105-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-106-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2284-104-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-103-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-102-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2284-101-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB