Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22/08/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
Soft.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Soft.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
Soft.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Soft.exe
Resource
win11-20240802-en
General
-
Target
Soft.exe
-
Size
738.3MB
-
MD5
bc326ee4dc8077a529fdba97fe700eb9
-
SHA1
25c8ca26f16901c6cc7d019c8cf4228c1040bed1
-
SHA256
a98827f9f913c38956cd07236eb6541a28d01869b7b72f1a382ec8953e4bbbce
-
SHA512
6b797ddd58fbba1754d7a13b3bbba2f65f4c2ebe22692a5e34f103810c71a37fddf744c6470f99f935dd00c17422ceb8367c0469a95c83554000db494b6096da
-
SSDEEP
98304:JiFWh1M/BQI39pr8I9UF/Zq7IlfQi7MVxb7A04o1RtT:Vb2j98xZq7MQi7MPb7T
Malware Config
Extracted
lumma
https://fictionnykwop.shop/api
https://potentioallykeos.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 2796 4264 Soft.exe 73 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73 PID 4264 wrote to memory of 2796 4264 Soft.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\bootcfg.exe"C:\Windows\SysWOW64\bootcfg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2796
-