Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
4789024a329b2261b6913ae6de68180e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4789024a329b2261b6913ae6de68180e.exe
Resource
win10v2004-20231215-en
General
-
Target
4789024a329b2261b6913ae6de68180e.exe
-
Size
692KB
-
MD5
4789024a329b2261b6913ae6de68180e
-
SHA1
27fdab1e2ed3dcabbb4fa8b5a093fa5e64378799
-
SHA256
5b0277f87ba9d6f996b755001949f7563f7e08800a5b984aeeb65118e345a0aa
-
SHA512
16c19d8e9c10943ad1e8513bcb7a7cac6ffe709164a85de217e3687c9d58e674ba55cf0c53711fe949278d3484e4a0a54cd9e6abd4d3924fd98943dd3efaaf60
-
SSDEEP
12288:pPAk41FUmnH/VFwl7uGcqh9L8I+UfqgjoGsnipVEYhXt7nXfgkSQ:d54/UWfVFwFuGcwtaY1Bl4kSQ
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 20 IoCs
resource yara_rule behavioral1/memory/1244-148-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/2144-151-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1244-116-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/2144-168-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/2144-172-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1768-293-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1768-311-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1768-317-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1944-433-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1944-451-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1944-458-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/3032-593-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/3032-600-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/2872-735-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/2872-742-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/804-876-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/804-882-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1160-1017-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/1160-1024-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 behavioral1/memory/2668-1158-0x0000000000400000-0x0000000000B6B13D-memory.dmp family_lumma_v4 -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 2 IoCs
pid Process 2144 winapi.exe 1768 winapi.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine 4789024a329b2261b6913ae6de68180e.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine winapi.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine winapi.exe -
Loads dropped DLL 4 IoCs
pid Process 1244 4789024a329b2261b6913ae6de68180e.exe 1244 4789024a329b2261b6913ae6de68180e.exe 2144 winapi.exe 2144 winapi.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\winapi.exe 4789024a329b2261b6913ae6de68180e.exe File opened for modification C:\Windows\SysWOW64\winapi.exe 4789024a329b2261b6913ae6de68180e.exe File opened for modification C:\Windows\SysWOW64\winapi.exe winapi.exe File created C:\Windows\SysWOW64\winapi.exe winapi.exe File opened for modification C:\Windows\SysWOW64\winapi.exe winapi.exe File created C:\Windows\SysWOW64\winapi.exe winapi.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1244 4789024a329b2261b6913ae6de68180e.exe 2144 winapi.exe 1768 winapi.exe -
Runs .reg file with regedit 10 IoCs
pid Process 2456 regedit.exe 2588 regedit.exe 2068 regedit.exe 1344 regedit.exe 2624 regedit.exe 1960 regedit.exe 2136 regedit.exe 1568 regedit.exe 1912 regedit.exe 876 regedit.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1244 4789024a329b2261b6913ae6de68180e.exe 2144 winapi.exe 1768 winapi.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2572 1244 4789024a329b2261b6913ae6de68180e.exe 30 PID 1244 wrote to memory of 2572 1244 4789024a329b2261b6913ae6de68180e.exe 30 PID 1244 wrote to memory of 2572 1244 4789024a329b2261b6913ae6de68180e.exe 30 PID 1244 wrote to memory of 2572 1244 4789024a329b2261b6913ae6de68180e.exe 30 PID 2572 wrote to memory of 1912 2572 cmd.exe 29 PID 2572 wrote to memory of 1912 2572 cmd.exe 29 PID 2572 wrote to memory of 1912 2572 cmd.exe 29 PID 2572 wrote to memory of 1912 2572 cmd.exe 29 PID 1244 wrote to memory of 2144 1244 4789024a329b2261b6913ae6de68180e.exe 28 PID 1244 wrote to memory of 2144 1244 4789024a329b2261b6913ae6de68180e.exe 28 PID 1244 wrote to memory of 2144 1244 4789024a329b2261b6913ae6de68180e.exe 28 PID 1244 wrote to memory of 2144 1244 4789024a329b2261b6913ae6de68180e.exe 28 PID 2144 wrote to memory of 1768 2144 winapi.exe 33 PID 2144 wrote to memory of 1768 2144 winapi.exe 33 PID 2144 wrote to memory of 1768 2144 winapi.exe 33 PID 2144 wrote to memory of 1768 2144 winapi.exe 33 PID 1768 wrote to memory of 1976 1768 winapi.exe 32 PID 1768 wrote to memory of 1976 1768 winapi.exe 32 PID 1768 wrote to memory of 1976 1768 winapi.exe 32 PID 1768 wrote to memory of 1976 1768 winapi.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4789024a329b2261b6913ae6de68180e.exe"C:\Users\Admin\AppData\Local\Temp\4789024a329b2261b6913ae6de68180e.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 708 "C:\Users\Admin\AppData\Local\Temp\4789024a329b2261b6913ae6de68180e.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 740 "C:\Windows\SysWOW64\winapi.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 752 "C:\Windows\SysWOW64\winapi.exe"4⤵PID:1944
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 756 "C:\Windows\SysWOW64\winapi.exe"5⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵PID:1572
-
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 760 "C:\Windows\SysWOW64\winapi.exe"6⤵PID:2872
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵PID:600
-
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 764 "C:\Windows\SysWOW64\winapi.exe"7⤵PID:804
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵PID:2748
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Runs .reg file with regedit
PID:1960
-
-
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 768 "C:\Windows\SysWOW64\winapi.exe"8⤵PID:1160
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵PID:1460
-
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 772 "C:\Windows\SysWOW64\winapi.exe"9⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵PID:2636
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Runs .reg file with regedit
PID:1568
-
-
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 744 "C:\Windows\SysWOW64\winapi.exe"10⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵PID:2356
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Runs .reg file with regedit
PID:2456
-
-
-
C:\Windows\SysWOW64\winapi.exeC:\Windows\system32\winapi.exe 776 "C:\Windows\SysWOW64\winapi.exe"11⤵PID:2372
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵PID:2856
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Runs .reg file with regedit
PID:876
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2572
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg1⤵
- Modifies security service
- Runs .reg file with regedit
PID:1912
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg1⤵
- Runs .reg file with regedit
PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat1⤵PID:1976
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat1⤵PID:1900
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg2⤵
- Runs .reg file with regedit
PID:2068
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg1⤵
- Runs .reg file with regedit
PID:1344
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg1⤵
- Runs .reg file with regedit
PID:2624
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg1⤵
- Runs .reg file with regedit
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
61KB
MD5c86b4e064d2a7943e2145bc95c0bed70
SHA1d20c32a1c89cd86cf4aaf226ea0220546a91b1a1
SHA2568d184d01f301d39d45ae445531f448c2ebb3014ec577639b38d8f78a9e9742e3
SHA5122a6b8cfb5899f3b8a0b7c80ce2ff0f429060555f5cd88153b43eed882d92170f7de53c4fabeb8b771f947a4553a8dce3e1102ab3d12c951d13f3d736256908b1