Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    193s
  • max time network
    197s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/05/2024, 04:59

General

  • Target

    17879ed48c2a2e324d4f5175112f51b75f4a8ab100b8833c82e6ddb7cd817f20.exe

  • Size

    3.8MB

  • MD5

    d1ae751134e04bf6188aaed148409620

  • SHA1

    8bf65a11e42b5850e1a5f28513dae1ffc168730e

  • SHA256

    17879ed48c2a2e324d4f5175112f51b75f4a8ab100b8833c82e6ddb7cd817f20

  • SHA512

    0c5623fa40f515b577182065e444749e0a834c99539e33f934d674693426cf6244e16af995f6ffbdfb084df95c62d5849bd9b822e1d5b145173591eaa468c5ea

  • SSDEEP

    98304:uaWw6I1MIB9qdaV02bBzrkG++McN9AG4OiZrq1DfPHNADtV6v+:uaWXW9c+McN9J4O7NADtV6v+

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://souptapedentisttactiwe.shop/api

https://secretionsuitcasenioise.shop/api

https://modestessayevenmilwek.shop/api

https://triangleseasonbenchwj.shop/api

https://culturesketchfinanciall.shop/api

https://sofahuntingslidedine.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17879ed48c2a2e324d4f5175112f51b75f4a8ab100b8833c82e6ddb7cd817f20.exe
    "C:\Users\Admin\AppData\Local\Temp\17879ed48c2a2e324d4f5175112f51b75f4a8ab100b8833c82e6ddb7cd817f20.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1308-6-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-5-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-4-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-3-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-2-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-1-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-0-0x0000000002E60000-0x0000000002EEB000-memory.dmp

    Filesize

    556KB

  • memory/1308-7-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1308-8-0x0000000002E60000-0x0000000002EEB000-memory.dmp

    Filesize

    556KB