Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe
Resource
win11-20240802-en
General
-
Target
2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe
-
Size
3.2MB
-
MD5
f8afafba3e86d50ad9edce1d0ea179ab
-
SHA1
da2a418d7d4f39222d16cfad8cb381ca53f7339c
-
SHA256
2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569
-
SHA512
a23d51e4621b9a18d9f99d797bccf64ded9fddc0c63ccda8df5d1d13c5e35633c14bcb66a3dd1205d07c5c3637a9d58e17794e1e85b9d78e578ec723a708abc4
-
SSDEEP
49152:Aa5dRh/rrdcQX7kAmen7jJRkNkdKiJZeKtH0LzHPzkRyq/cHG53IpOMb6tdz6c:Aa5rJ/+ewIH/5dKaZeQH0Lc8GKAdz6c
Malware Config
Extracted
lumma
https://awwardwiqi.shop/api
https://locatedblsoqp.shop/api
https://traineiwnqo.shop/api
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe -
Executes dropped EXE 11 IoCs
pid Process 1528 7z.exe 4456 7z.exe 2472 7z.exe 4916 7z.exe 3556 7z.exe 3644 7z.exe 1480 7z.exe 2504 7z.exe 2340 7z.exe 4996 7z.exe 716 nRQUvisZS5yyGTCGUs.exe -
Loads dropped DLL 10 IoCs
pid Process 1528 7z.exe 4456 7z.exe 2472 7z.exe 4916 7z.exe 3556 7z.exe 3644 7z.exe 1480 7z.exe 2504 7z.exe 2340 7z.exe 4996 7z.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 716 set thread context of 5040 716 nRQUvisZS5yyGTCGUs.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 544 5040 WerFault.exe 112 2072 5040 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nRQUvisZS5yyGTCGUs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeRestorePrivilege 1528 7z.exe Token: 35 1528 7z.exe Token: SeSecurityPrivilege 1528 7z.exe Token: SeSecurityPrivilege 1528 7z.exe Token: SeRestorePrivilege 4456 7z.exe Token: 35 4456 7z.exe Token: SeSecurityPrivilege 4456 7z.exe Token: SeSecurityPrivilege 4456 7z.exe Token: SeRestorePrivilege 2472 7z.exe Token: 35 2472 7z.exe Token: SeSecurityPrivilege 2472 7z.exe Token: SeSecurityPrivilege 2472 7z.exe Token: SeRestorePrivilege 4916 7z.exe Token: 35 4916 7z.exe Token: SeSecurityPrivilege 4916 7z.exe Token: SeSecurityPrivilege 4916 7z.exe Token: SeRestorePrivilege 3556 7z.exe Token: 35 3556 7z.exe Token: SeSecurityPrivilege 3556 7z.exe Token: SeSecurityPrivilege 3556 7z.exe Token: SeRestorePrivilege 3644 7z.exe Token: 35 3644 7z.exe Token: SeSecurityPrivilege 3644 7z.exe Token: SeSecurityPrivilege 3644 7z.exe Token: SeRestorePrivilege 1480 7z.exe Token: 35 1480 7z.exe Token: SeSecurityPrivilege 1480 7z.exe Token: SeSecurityPrivilege 1480 7z.exe Token: SeRestorePrivilege 2504 7z.exe Token: 35 2504 7z.exe Token: SeSecurityPrivilege 2504 7z.exe Token: SeSecurityPrivilege 2504 7z.exe Token: SeRestorePrivilege 2340 7z.exe Token: 35 2340 7z.exe Token: SeSecurityPrivilege 2340 7z.exe Token: SeSecurityPrivilege 2340 7z.exe Token: SeRestorePrivilege 4996 7z.exe Token: 35 4996 7z.exe Token: SeSecurityPrivilege 4996 7z.exe Token: SeSecurityPrivilege 4996 7z.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1212 wrote to memory of 4704 1212 2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe 87 PID 1212 wrote to memory of 4704 1212 2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe 87 PID 4704 wrote to memory of 2304 4704 cmd.exe 89 PID 4704 wrote to memory of 2304 4704 cmd.exe 89 PID 4704 wrote to memory of 1528 4704 cmd.exe 90 PID 4704 wrote to memory of 1528 4704 cmd.exe 90 PID 4704 wrote to memory of 4456 4704 cmd.exe 91 PID 4704 wrote to memory of 4456 4704 cmd.exe 91 PID 4704 wrote to memory of 2472 4704 cmd.exe 92 PID 4704 wrote to memory of 2472 4704 cmd.exe 92 PID 4704 wrote to memory of 4916 4704 cmd.exe 93 PID 4704 wrote to memory of 4916 4704 cmd.exe 93 PID 4704 wrote to memory of 3556 4704 cmd.exe 94 PID 4704 wrote to memory of 3556 4704 cmd.exe 94 PID 4704 wrote to memory of 3644 4704 cmd.exe 95 PID 4704 wrote to memory of 3644 4704 cmd.exe 95 PID 4704 wrote to memory of 1480 4704 cmd.exe 96 PID 4704 wrote to memory of 1480 4704 cmd.exe 96 PID 4704 wrote to memory of 2504 4704 cmd.exe 97 PID 4704 wrote to memory of 2504 4704 cmd.exe 97 PID 4704 wrote to memory of 2340 4704 cmd.exe 98 PID 4704 wrote to memory of 2340 4704 cmd.exe 98 PID 4704 wrote to memory of 4996 4704 cmd.exe 99 PID 4704 wrote to memory of 4996 4704 cmd.exe 99 PID 4704 wrote to memory of 2888 4704 cmd.exe 100 PID 4704 wrote to memory of 2888 4704 cmd.exe 100 PID 4704 wrote to memory of 716 4704 cmd.exe 101 PID 4704 wrote to memory of 716 4704 cmd.exe 101 PID 4704 wrote to memory of 716 4704 cmd.exe 101 PID 716 wrote to memory of 5040 716 nRQUvisZS5yyGTCGUs.exe 112 PID 716 wrote to memory of 5040 716 nRQUvisZS5yyGTCGUs.exe 112 PID 716 wrote to memory of 5040 716 nRQUvisZS5yyGTCGUs.exe 112 PID 716 wrote to memory of 5040 716 nRQUvisZS5yyGTCGUs.exe 112 PID 716 wrote to memory of 5040 716 nRQUvisZS5yyGTCGUs.exe 112 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2888 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe"C:\Users\Admin\AppData\Local\Temp\2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\mode.commode 65,103⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p151921358818216190771159712614 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_9.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_8.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\system32\attrib.exeattrib +H "nRQUvisZS5yyGTCGUs.exe"3⤵
- Views/modifies file attributes
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\main\nRQUvisZS5yyGTCGUs.exe"nRQUvisZS5yyGTCGUs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 12085⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 11885⤵
- Program crash
PID:2072
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5040 -ip 50401⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5040 -ip 50401⤵PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD543aae2a6566fde0ba4bb6ac7eb8a2d9b
SHA1600e2399cf9f11ec75b17729e5e770188d0365c1
SHA2562a9584d775535aeeb4efcced681b478401daa051ed5d93e3401d393e3a3d4d8e
SHA512027951b64a4d68aa11c5c52d7df3d1238bb8b02ffc85a966cbd1758ee81826611f928eaea3c438fc7006176945eb45424b22a414a0fdebcbfe85bf31d36610f0
-
Filesize
702KB
MD5ba3f5afa1e53146b404395483712fb14
SHA170c5c1c73e8891a56429b3a3fdf0bb1b3cb9ec54
SHA25662b209a7385464459f6c34fd31d160a21b38dbcb627ddb7ef9f1f4b7567f23f9
SHA512ba77869f1a4eb60cad2b9346de775317be6a20e884e6689539355d57e14678a5f13c3adfd44671d7831f57c9e1587f9a7736a4e80f98f58a5cdbefd47f983834
-
Filesize
702KB
MD5e750fba0b64391a934fb93b3753529b6
SHA1d3028d85a7052c9a59cfc6d89a8cdca6459bc460
SHA256a2e6b8d81e5322eeed80bc3d4b6da3ab0574fe9ff3c4b49e30c0f7159c3369c2
SHA51233f7b1dc3f4193028218b4250d6786aedcc3a3333ca940b6ff582ece60ec4564774114547acf5eaecbdb89b7e850695cc6c27e0ddc9963027407101158f2b2a6
-
Filesize
702KB
MD5a9f77d700719afd4bb038e7aed531344
SHA11462339d5c807a76dcafb2656b6aca6ee0d60666
SHA2567df19bca8feab85046f19831d1874fbc3fadb9e30a392d7375f50aac174d6123
SHA512ae5851a887ad2796651b5f1dd59115f0bb00c509029d1999d9f54a7e5f231eb8f98f51b9ff06e94c3d9bbe436bb9ef21aa4740a3cbe84ae695ad8ca0ce448c45
-
Filesize
702KB
MD58c6e76beb87b9cfff64e5a54f1c227df
SHA105c40771381d42b88fd7ca1c4a57b55391def50f
SHA256cf2c06ccde56e42374647c1cb39563f236b2088b312be3cd68f66a1effabdfd8
SHA512946ded739baa321c7d5162b210d3117d4bf5751ed2fe413d674e2c2f6c2e836b73b5b4731c360bcc79509de50d7051d68fcf2b181bfe9cee6787ca9d882ac545
-
Filesize
702KB
MD59c177f44457d3a1589f64dacafcf5ee5
SHA13e561635879d9b5b3337fe92426386890634e55d
SHA256599a40d0ac901e9fffcabde40f74474126c260c215d45ac0f6c479ab222a6243
SHA5121646bea1b5eabeb28cb0713d7ec4b6010390280c0f36cba5e145ea65a4d4ead520dee70ec3be5c269c6500c3a306a1e4abc86ca3752d5653f957101768155594
-
Filesize
703KB
MD5e8c36f78487d680955ce66b9e56c5cea
SHA189b90f78f7db329662a10d8d555a6fb3f0970806
SHA2568057b11b42ea9d4213d9677567b59b020172e97119a8c0150a96be3373b819b7
SHA512b39fbea1273090eac573a755cf33e29b202b473310362e7a54362caed8c2289809c2bc3dd902833f71f7a67799b8a992a994bcee3d0bd7bc2dd6f242e5018834
-
Filesize
703KB
MD579b83d924dfe491fbbd357d0d2ba3537
SHA1ce1c477e380c6c1baf4fe7ee947e7893edc0d8ec
SHA25628012fb4ed536207b7ed824424c0ac2550286c3d5c64ea10a8645143ed2fdf20
SHA5123f5e6b889204874cbeb8234921d5e916d1529231f5dd1bd52781748bd7a88ae07ed409b251fb5d67a3479930791a4fb7914ee162791242fe694cc41b89f74ed7
-
Filesize
703KB
MD5e43b1a119fd6e09912cf4a1c9e5380c5
SHA1678fcb1d3ece3bc0ad7a05bcf3edf6a04890f9a8
SHA256005ad39af288f4a11564c88a14528df929da1a5bff930af6a803c173ca6c9b19
SHA512d7f35adeabdf407a34eb462bdc6cd5958d107a7fe8fd55ce708283bfbf938047c5f8044a529c698e69fb74122920d413cae53bb89afa3fb2669c0152fd31a058
-
Filesize
2.3MB
MD59c466d3f3e802906a978cd14705a36cd
SHA14b48f197c94725b7ea61d438ba14717bc5587efc
SHA25673ca27aa83e83f8609e41055c71b0715e2ba2c2759941bf0733164c11ee41138
SHA5127238582f31aff809015424bccdba310459c9ce8e29efbf47c961a302e3dbf4a8c436b393bdae6097abe168bcf7d5b407d1ef4b4552633938ba997ccd122f3289
-
Filesize
2.3MB
MD5b4581612d06dbbd6009168d180b71b75
SHA13a351b6fcd554ffd1da0c5d56cf49461fb9a9a11
SHA256ddeba62b92a2abb1f230bcddfcc56cccd6f9e7f15bd536a0cc699a2133b57123
SHA51283fd082a9463adced28c938232daae549d534dbbb91296c0167b917fcb97020ab478918810a5bfaf177f1733569b0482ed4bd6b6e9dac9220803170390dda9e0
-
Filesize
521B
MD5a0aaf1fd029e946cc8ab2628aa972729
SHA1280ebbf12eb0344a39b44a445090b24bb8c1569d
SHA2567571848c9299ddeaa782dc55b48ecc6fccaf77ccc7decdab6a7cc63f4d8b202e
SHA51203e33ab4f4e787ecc9c07ee9f7ca9b1839a22998a206b971c51db60cd8d41465bdf84b00fa50564052750e20c0636a8546c4e830488fade71391657dc61bbe39
-
Filesize
870KB
MD5a5e9a6102f073ccde190fa1c6bea9d5f
SHA11a5d427d0738c8da04dea72a15b1cda76c361336
SHA25646d02b58dd26cc524064d5fbe0a4f2a54d97e5b01d524c1a1beedeb54079f10e
SHA512ee89f3aa7160550c9e7a5ab5c8dec5c5c43092f84a198af3e1bea221bdfd9dde7280130012ea5262fcdd350c0261dd3ab054e2c9eee0b81611b2f0e4b5e00ee1