Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Terraria_1.4.4.9.zip
windows7-x64
7Terraria_1.4.4.9.zip
windows10-2004-x64
1Terraria_1...p3.zip
windows7-x64
1Terraria_1...p3.zip
windows10-2004-x64
1AlbumArtSmall.jpg
windows7-x64
3AlbumArtSmall.jpg
windows10-2004-x64
3Folder.jpg
windows7-x64
3Folder.jpg
windows10-2004-x64
3Re-Logic -...ay.mp3
windows7-x64
1Re-Logic -...ay.mp3
windows10-2004-x64
6Re-Logic -...ie.mp3
windows7-x64
1Re-Logic -...ie.mp3
windows10-2004-x64
6Re-Logic -...ht.mp3
windows7-x64
1Re-Logic -...ht.mp3
windows10-2004-x64
6Re-Logic -...en.mp3
windows7-x64
1Re-Logic -...en.mp3
windows10-2004-x64
6Re-Logic -...nd.mp3
windows7-x64
1Re-Logic -...nd.mp3
windows10-2004-x64
6Re-Logic -... 1.mp3
windows7-x64
1Re-Logic -... 1.mp3
windows10-2004-x64
6Re-Logic -...le.mp3
windows7-x64
1Re-Logic -...le.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Re-Logic -... 2.mp3
windows7-x64
1Re-Logic -... 2.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Terraria_1.4.4.9.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Terraria_1.4.4.9.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AlbumArtSmall.jpg
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
AlbumArtSmall.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Folder.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Folder.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win10v2004-20241007-en
General
-
Target
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
-
Size
5.9MB
-
MD5
3cf04c05f3bef9e34e41529f308c83f2
-
SHA1
c3336cf78a1599eb3456aade7d6395ea0355d1c0
-
SHA256
59327c3fd7705714c2af5a397a5bf0efedbda59189ff48bd07e418dedf797e01
-
SHA512
ec7c7dd63c025ba3702a668c160000055c23bf7958a204ce4fb3af64b3db7f32a2dae7f2e194d2ab20a7ca2ea1dd9eaf7ac119e71796dcbea22947275a9a635a
-
SSDEEP
98304:8LBYMZCiYumNWp+4eoEGVi/BTkALgfNBjZuL6Eq1hUC1qRA4MFWRz1DqqPh/NtVY:8LBMVs6DDL4AmEEhvq69MRzNqGpNtVSd
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-493223053-2004649691-1575712786-1000\{6418E468-DC85-48DA-B914-A7CD5512E752} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2384 wmplayer.exe Token: SeCreatePagefilePrivilege 2384 wmplayer.exe Token: SeShutdownPrivilege 844 unregmp2.exe Token: SeCreatePagefilePrivilege 844 unregmp2.exe Token: 33 4172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4172 AUDIODG.EXE Token: SeShutdownPrivilege 2384 wmplayer.exe Token: SeCreatePagefilePrivilege 2384 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2384 wrote to memory of 5048 2384 wmplayer.exe 85 PID 2384 wrote to memory of 5048 2384 wmplayer.exe 85 PID 2384 wrote to memory of 5048 2384 wmplayer.exe 85 PID 5048 wrote to memory of 844 5048 unregmp2.exe 86 PID 5048 wrote to memory of 844 5048 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4328
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x30c 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5563088ad0f20fabf9dd62c6ba8ae1636
SHA1f9cd2fd153afa1a12ff990cf27c32b8c9c44e878
SHA256eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184
SHA5128229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092
-
Filesize
1024KB
MD587e97393e62fa42f452ffe9b060f67e2
SHA185d2f1cd8b9c58a008c665b2bccdc323610fa5c0
SHA256da4bcbd00e4aae933ddb6f9c7272c7dd6db6f1bb1b9f2c255f65b844ec9aeba3
SHA512bdf92ebf883b31afe3a6a2a4d0929df0d54f867732aacbf5efd5f427683e2ac8edce90f121a07cfa4593ad5f42acca2c63783a85edccfa024a0b28882ed2527d
-
Filesize
68KB
MD5a705fa843b299eebd85eeed73d00c4b8
SHA1f7dac98c3fbc833db915c8a75a974819fb927736
SHA2563db120fa1b02ae4d23a31c2fed619f33f0505cdb3cdefa7707c69fb4b843a81f
SHA5121a8f27cea067a11fb7166e6236772b420c061afc5d51661879382a1cd06509adc8873ebc2e2e89c0910d2003f6aba0dc35ccb9f88471e34543e6bf33df6eee6b
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD554e4cf0dbe44ffa83e6511f15ab92627
SHA1ea03c889be0c3016acb84c58d077694040f2b1da
SHA256e2e4cff62ee369ac0b769aeae3a0e2b62ea6c485bfc2cdcd6fdfe95bf398a05c
SHA512fb0c5e132cd2a15faa6dc88087f222d2cc3f50ecfb44f588df048a5a049e4dbd797a41dd5c24a5547932427e3eb16020224b1c2f69fae129396a326abbe7bf33