Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3fix/UICommon.dll
windows7-x64
1fix/UICommon.dll
windows10-2004-x64
1fix/libisl-13.dll
windows7-x64
1fix/libisl-13.dll
windows10-2004-x64
1fix/msvcp140.dll
windows7-x64
1fix/msvcp140.dll
windows10-2004-x64
1fix/x86_64...ib.exe
windows7-x64
1fix/x86_64...ib.exe
windows10-2004-x64
10Analysis
-
max time kernel
34s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
fix/UICommon.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fix/UICommon.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
fix/libisl-13.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
fix/libisl-13.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
fix/msvcp140.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
fix/msvcp140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
fix/x86_64-w64-ranlib.exe
Resource
win7-20240705-en
General
-
Target
fix/x86_64-w64-ranlib.exe
-
Size
250KB
-
MD5
b40603b7987e2a438a9031274f9b3a2f
-
SHA1
33991bf7f63266d80dce58b562a39961f70a44a4
-
SHA256
fa7512bc01ed215ecbbcc2c1fd8b73fd77c6222f3f86604f714881d4460fa11f
-
SHA512
c09abbfb10c49a50b3b4c1a5f08a9576a0cb89e87e5d8c60685db4aeb9ec8e47f59773685d182bfcbed8ebe3e72b50503a27876cd917f12a3f39a68816635796
-
SSDEEP
3072:76b0UkfKZe8wvHInktbACG9er/wFpz05+t6lTMBorSaXXlXf:Ob0UctzH6QjsUazm9
Malware Config
Extracted
lumma
https://froytnewqowv.shop/api
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4436 x86_64-w64-ranlib.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4436 set thread context of 3132 4436 x86_64-w64-ranlib.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 3384 3132 WerFault.exe 89 2872 3132 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x86_64-w64-ranlib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1248 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89 PID 4436 wrote to memory of 3132 4436 x86_64-w64-ranlib.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fix\x86_64-w64-ranlib.exe"C:\Users\Admin\AppData\Local\Temp\fix\x86_64-w64-ranlib.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 11883⤵
- Program crash
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 12283⤵
- Program crash
PID:2872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3132 -ip 31321⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3132 -ip 31321⤵PID:4532
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5ee17e8b41433c7c5f5df512bbc6c3f4d
SHA1763dbfd2d8e44c71b7645736f63f2c34f3ff06a3
SHA256fa0abdf2f09a54637e26f6be24ab38766b7e04c5dfd5c13f485fe3e108cbe3da
SHA5120231663ed20020bac18bc2bff2e13568651dda747fceee5ac648a276bba3fb79c5cae928dcd12d0715d33b519a46157a2fa9df739a5c3c1e4afdf94299c36e24