Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 07:49
Behavioral task
behavioral1
Sample
26eceb573a9b370e188212f4f8711697.exe
Resource
win7-20240705-en
General
-
Target
26eceb573a9b370e188212f4f8711697.exe
-
Size
2.8MB
-
MD5
26eceb573a9b370e188212f4f8711697
-
SHA1
394d5b69c5801346b5f031a79166b019b2be97ce
-
SHA256
90f0d7fa294a8b883497d51b97bf5bd935a3ad25d3b5010f094d28df404cd416
-
SHA512
4d8c36e2e22974be0410cb5382bda987ba055d5168002145597f64045dfe759095a68ded7866fa25b7bf5f1d3c7602578accaf94c58d07dccb892d883dbef685
-
SSDEEP
24576:Ine+Kl3nj44G/aT3S41O2m4zt6FJLHU7vlamWGMD0AxGvM:fl38ETSt4ztMLHU8G
Malware Config
Extracted
lumma
https://uttercarrigsno.shop/api
https://unseaffarignsk.shop/api
https://shepherdlyopzc.shop/api
https://upknittsoappz.shop/api
https://liernessfornicsa.shop/api
https://outpointsozp.shop/api
https://callosallsaospz.shop/api
https://lariatedzugspd.shop/api
https://indexterityszcoxp.shop/api
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 䩊剁兑剕兕婊 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4652 set thread context of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 3984 2268 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 䩊剁兑剕兕婊 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84 PID 4652 wrote to memory of 2268 4652 26eceb573a9b370e188212f4f8711697.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\26eceb573a9b370e188212f4f8711697.exe"C:\Users\Admin\AppData\Local\Temp\26eceb573a9b370e188212f4f8711697.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\䩊剁兑剕兕婊"C:\Users\Admin\AppData\Local\Temp\䩊剁兑剕兕婊"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 3723⤵
- Program crash
PID:3984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2268 -ip 22681⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD53992f464696b0eeff236aef93b1fdbd5
SHA18dddabaea6b342efc4f5b244420a0af055ae691e
SHA2560d1a8457014f2eb2563a91d1509dba38f6c418fedf5f241d8579d15a93e40e14
SHA51227a63b43dc50faf4d9b06e10daa15e83dfb3f3be1bd3af83ea6990bd8ae6d3a6a7fc2f928822db972aaf1305970f4587d768d68cd7e1124bc8f710c1d3ee19a6