Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 16:03

General

  • Target

    Apocalуpsе/Apocalypse.exe

  • Size

    58.6MB

  • MD5

    cd61aabe34ccd3da0ca94248b1c61b83

  • SHA1

    f629095066fe5b7767fb8319b93dadab8480532d

  • SHA256

    ce08a234a253e58605ccfa28860ee08a213464e6b7467cdf7ed2157195008ed5

  • SHA512

    cee0220bc469dfd4ad5cd9a8a9feaecb66c1b4855f103d58fe3811886bb853bd7866bb7db2fb67ec7a95712030348f3e7bf1fdc5e20bbe1017a11e1568091338

  • SSDEEP

    393216:EHPp6fICo8749CrOE7MC8+6wSNvAqp3XUC:sPp6fIp8748qEZ8+61eaXU

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://disappearsodsz.shop/api

https://potentioallykeos.shop/api

https://interactiedovspm.shop/api

https://charecteristicdxp.shop/api

https://cagedwifedsozm.shop/api

https://deicedosmzj.shop/api

https://southedhiscuso.shop/api

https://consciousourwi.shop/api

https://tenntysjuxmz.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Apocalуpsе\Apocalypse.exe
    "C:\Users\Admin\AppData\Local\Temp\Apocalуpsе\Apocalypse.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/216-0-0x00007FF6C2130000-0x00007FF6C5C5A000-memory.dmp

    Filesize

    59.2MB

  • memory/216-5-0x00007FF6C2130000-0x00007FF6C5C5A000-memory.dmp

    Filesize

    59.2MB

  • memory/216-7-0x00007FF6C2130000-0x00007FF6C5C5A000-memory.dmp

    Filesize

    59.2MB

  • memory/4752-6-0x0000000001010000-0x000000000105C000-memory.dmp

    Filesize

    304KB

  • memory/4752-9-0x0000000001010000-0x000000000105C000-memory.dmp

    Filesize

    304KB

  • memory/4752-10-0x0000000001010000-0x000000000105C000-memory.dmp

    Filesize

    304KB

  • memory/4752-11-0x0000000001010000-0x000000000105C000-memory.dmp

    Filesize

    304KB