Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Terraria_1.4.4.9.zip
windows7-x64
7Terraria_1.4.4.9.zip
windows10-2004-x64
1Terraria_1...p3.zip
windows7-x64
1Terraria_1...p3.zip
windows10-2004-x64
1AlbumArtSmall.jpg
windows7-x64
3AlbumArtSmall.jpg
windows10-2004-x64
3Folder.jpg
windows7-x64
3Folder.jpg
windows10-2004-x64
3Re-Logic -...ay.mp3
windows7-x64
1Re-Logic -...ay.mp3
windows10-2004-x64
6Re-Logic -...ie.mp3
windows7-x64
1Re-Logic -...ie.mp3
windows10-2004-x64
6Re-Logic -...ht.mp3
windows7-x64
1Re-Logic -...ht.mp3
windows10-2004-x64
6Re-Logic -...en.mp3
windows7-x64
1Re-Logic -...en.mp3
windows10-2004-x64
6Re-Logic -...nd.mp3
windows7-x64
1Re-Logic -...nd.mp3
windows10-2004-x64
6Re-Logic -... 1.mp3
windows7-x64
1Re-Logic -... 1.mp3
windows10-2004-x64
6Re-Logic -...le.mp3
windows7-x64
1Re-Logic -...le.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Re-Logic -... 2.mp3
windows7-x64
1Re-Logic -... 2.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Terraria_1.4.4.9.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Terraria_1.4.4.9.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AlbumArtSmall.jpg
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
AlbumArtSmall.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Folder.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Folder.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win10v2004-20241007-en
General
-
Target
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
-
Size
5.6MB
-
MD5
c5cfc965e54e040d4ed15d1035aa4b22
-
SHA1
dee12b931e78ac348df087b4b701a7d1075d2a11
-
SHA256
a2bf8a9b769843a8abec58554c7337fa238411307d51601667b714a37ec1ee8a
-
SHA512
8f62f547eb4c0f23981b1c2d5f287cd76f67e5b9dd4b42cb0e21f11f346e5c1e1fe3689b40ce5371c58de8ccca3093b5dd8d1592603912989db85aef69e0c1c1
-
SSDEEP
98304:2LBYMZb78cRuIokvQDfTWfn9/sPDyew4BHOApaiOSv3zx/Tm0H79ZC08S/3qci:2LBh8sQDfyV2y4BHBESVX5Zx8Syci
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3227495264-2217614367-4027411560-1000\{8EA60DD3-D5F9-466C-9E19-95A19124D88B} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3004 wmplayer.exe Token: SeCreatePagefilePrivilege 3004 wmplayer.exe Token: SeShutdownPrivilege 3620 unregmp2.exe Token: SeCreatePagefilePrivilege 3620 unregmp2.exe Token: 33 3700 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3700 AUDIODG.EXE Token: SeShutdownPrivilege 3004 wmplayer.exe Token: SeCreatePagefilePrivilege 3004 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1624 3004 wmplayer.exe 85 PID 3004 wrote to memory of 1624 3004 wmplayer.exe 85 PID 3004 wrote to memory of 1624 3004 wmplayer.exe 85 PID 1624 wrote to memory of 3620 1624 unregmp2.exe 86 PID 1624 wrote to memory of 3620 1624 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4216
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4d8 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:3700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD53d62e3f72f600de89d2574e8568e0d37
SHA1d90ac9cd9e6692e5cd23fd53173e6bc50738bdf2
SHA256de70c861a550934232e1006891d47566e20a219b16f97856ff60238de31d142a
SHA5120bac4d2bd9c80ab0e268b40626653a6c19c51bff15f249064c0a20b4759a6ae329dff9d9a93098556ed055dc8233b48a106bd205649320299b70df85ebd0a08d
-
Filesize
1024KB
MD5f3fcee5debb95a81e17b0e3d2f1329c1
SHA1f1e3acba6be7dc14d99c5419160737cee3404f2b
SHA256a0e642752bf5537c181483da1c9d424e57e9d9f59829b40120772952d4502ae8
SHA5129c5a9a417ead9261b4327f62c274b4522d42c05d8a8795a2296c318c04562609eaeecafed3d5e609e682b4a0d649144507829aeed8e8342185dd6f1a2d1357b3
-
Filesize
68KB
MD5a19faccf2ef74671049757f39a2e69b0
SHA181e4f501fce43130d9c4dce34ceaf20a94df19b9
SHA2564e6e76dc9f00143ebf86f43b212c6ee4b3754c2847b4e292c2314fd32157eff9
SHA5126aa125c69f9af851e363083793869b83f962f649b9bf3d9e6f5e4d570b68d689c836d01bd83b3fccccebc9abaf1a5a691284881a900c8168b1054c36ee7bec28
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD5f0f3836dec09ece60a4bcb63b38e70ea
SHA18366613796fc80f03c87c290882590a6b9a35c67
SHA256d2cbd8923164af01f7c4a0655602e0fabef1ab48aa883e2b3de9e83c54c66e8a
SHA5129bab07baf948b0b8379caaa93f716f59403761e980afae4df50be5c371b1d880db2447113ba30400944eed2c460f75a07f0f4fbc6b7129f160a7e454a340e80f