Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/08/2024, 21:38
240806-1hccqa1fln 10Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
Setup_v1.31.exe
Resource
win7-20240704-en
General
-
Target
Setup_v1.31.exe
-
Size
24.8MB
-
MD5
03663b9afb57ce9ffc1aae9fd882054e
-
SHA1
356ce09526cb48e7eec4fe7928dec57fdfd93352
-
SHA256
1cc1c7d234dffa6d531d41db847baa50faee66d673f2bf43fb27ebab3e9ed8cc
-
SHA512
f1d99a65724aa4ed31dc312ed784737f48d4cae443f8046d13c492cc6dc06c5f0eae1cc89231c63a70b4f202790bf2a656a88346662c13fdf68e6566bb578d35
-
SSDEEP
98304:RB8JtamT3nuqknLK6h0YOQn7sBKZ/xMTOEmCIe8pw153XmaTdE5dY0qGCE:qHpknLKy0YOq7sC/IrmCIe8UmlAL
Malware Config
Extracted
lumma
https://celebratioopz.shop/api
https://writerospzm.shop/api
https://deallerospfosu.shop/api
https://bassizcellskz.shop/api
https://mennyudosirso.shop/api
https://languagedscie.shop/api
https://complaintsipzzx.shop/api
https://quialitsuzoxm.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 712 1492 Setup_v1.31.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1492 wrote to memory of 712 1492 Setup_v1.31.exe 86 PID 1492 wrote to memory of 712 1492 Setup_v1.31.exe 86 PID 1492 wrote to memory of 712 1492 Setup_v1.31.exe 86 PID 1492 wrote to memory of 712 1492 Setup_v1.31.exe 86 PID 1492 wrote to memory of 712 1492 Setup_v1.31.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_v1.31.exe"C:\Users\Admin\AppData\Local\Temp\Setup_v1.31.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:712
-