Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Wave.JohnP...ed.rar
windows11-21h2-x64
1CefSharp.C...me.dll
windows11-21h2-x64
1WaveWindow...ed.exe
windows11-21h2-x64
10bin/Background.mp4
windows11-21h2-x64
6bin/lz4.dll
windows11-21h2-x64
1bin/wolfssl.dll
windows11-21h2-x64
1bin/xxhash.dll
windows11-21h2-x64
1bin/zlib1.dll
windows11-21h2-x64
1bin/zstd.dll
windows11-21h2-x64
1cracked by...lx.txt
windows11-21h2-x64
3d3dcompiler_47.dll
windows11-21h2-x64
1Analysis
-
max time kernel
597s -
max time network
578s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/11/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
Wave.JohnPrlx.cracked.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
CefSharp.Core.Runtime.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
WaveWindowsCracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
bin/Background.mp4
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bin/lz4.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
bin/wolfssl.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
bin/xxhash.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
bin/zlib1.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
bin/zstd.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
cracked by JohnPrlx.txt
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
d3dcompiler_47.dll
Resource
win11-20241007-en
General
-
Target
bin/Background.mp4
-
Size
4.6MB
-
MD5
9782180eb68f73030fe24ef6a1735932
-
SHA1
589827fe098ba048c9f871a28db8eae3e3537ff4
-
SHA256
3a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
-
SHA512
dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
SSDEEP
98304:xs/6Ldccul3Wn48btjNEkPSFTaIwJ0Mt6KNY:xs/Gul3EvEmFItMkb
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3870231897-2573482396-1083937135-1000\{B3133575-A49C-4A4E-B708-79B19A275207} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4936 wmplayer.exe Token: SeCreatePagefilePrivilege 4936 wmplayer.exe Token: SeShutdownPrivilege 3184 unregmp2.exe Token: SeCreatePagefilePrivilege 3184 unregmp2.exe Token: 33 236 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 236 AUDIODG.EXE Token: SeShutdownPrivilege 4936 wmplayer.exe Token: SeCreatePagefilePrivilege 4936 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4936 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4936 wrote to memory of 5112 4936 wmplayer.exe 78 PID 4936 wrote to memory of 5112 4936 wmplayer.exe 78 PID 4936 wrote to memory of 5112 4936 wmplayer.exe 78 PID 5112 wrote to memory of 3184 5112 unregmp2.exe 79 PID 5112 wrote to memory of 3184 5112 unregmp2.exe 79
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\bin\Background.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:336
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004CC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5066f6e5acfff197d12b550ef7d452d41
SHA1aaa8cfa5a56519594490d069f31a42a15ca515a2
SHA256cac3a8354c7766b4ce0900bf4d8097bf372ec405a6af4bba63a6d92132932a30
SHA51221c3985bdc883b7c0fcdfb660a577eb03870943d9e812a24726158b6c06cc36b00425fdeafddcb099fddd1488173280563f7241c9589e69d04d1eb1b5daa786b
-
Filesize
1024KB
MD555a4ac76f976ff9ede548b042d9821f1
SHA1a95d90c40f5256e550da3130bd0fa767d4de6c1d
SHA256108b99131c3408050ff81c9915bfe4c25241677c090e9f7cdc21386deb2e6cce
SHA512d44618366fac804f8f1087520a403925ecb848c9b79346f5be18b662bb23432ec659593bdd76422aa499f938e9aef5f3e131236adcea4e3e43a42ae06b8b137b
-
Filesize
68KB
MD50056c2a9d451bacf74368660a991ab27
SHA13cc25ea02d2b3531d582bfd00a869faf7bd4592c
SHA25682c9ebbab6aa0c8ae48e9dba5a88b8429c9caea9a9a89eabcb50fd6f508a3543
SHA5124687b30591869e356737c9985779e0f0ea0d176b9140742f8d9eb1128ac50c8f31a63aa67e00c3fe336d2877fdf3e517a8c82f895224ad00f6ce8337365c449d
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD513ffdf9b1e4c4e38d44577128e5adb5d
SHA1ce047792fcc16671c0eefdb36642355e7b0797fc
SHA2564e8c4561a5920a698eb80a84c3b6298e2ce3cb19249ff4412d5f1605ddfcc64f
SHA512779f4f56fb7f81041f7d9fb8b1dbf19733bc26fd1e1f646c9b1791d626ef317c5938cf8a171e839f2abe4d2cc499d6a1a3746b877047ae812a9f42cdf12e3784