Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 04:45

General

  • Target

    2024-08-29_b2a68275cf4bc5e94453f25c54a1997c_poet-rat_snatch.exe

  • Size

    19.6MB

  • MD5

    b2a68275cf4bc5e94453f25c54a1997c

  • SHA1

    966ce16832c313cbeec4eebbc899bd8b217f6991

  • SHA256

    ce02ad889b773e312e1b48d3583b191496320c2d20c9b808fa56f3f06c3c31fe

  • SHA512

    b7da6ff739178bea5ce96ddc6cc671a6da8a452392ae3760fc7693960654c2542e7338d633047d1b5fdcc66b521eea12c3fcab90b23d4b834cce551c567c0861

  • SSDEEP

    98304:hR9/3VaGKKArwAQY56zShXJQ8CBH1Aqu4E1O2kuxfgWZbv7yM0VcFmV308ly5fon:RFacAPx1CF1/E17pzyM0SmVafkZwsEC

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://readdyloopyeow.shop/api

https://locatedblsoqp.shop/api

https://traineiwnqo.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-29_b2a68275cf4bc5e94453f25c54a1997c_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-29_b2a68275cf4bc5e94453f25c54a1997c_poet-rat_snatch.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/536-0-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/536-1-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/536-2-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/536-3-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/536-4-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB