Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 12:20

General

  • Target

    2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe

  • Size

    3.2MB

  • MD5

    f8afafba3e86d50ad9edce1d0ea179ab

  • SHA1

    da2a418d7d4f39222d16cfad8cb381ca53f7339c

  • SHA256

    2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569

  • SHA512

    a23d51e4621b9a18d9f99d797bccf64ded9fddc0c63ccda8df5d1d13c5e35633c14bcb66a3dd1205d07c5c3637a9d58e17794e1e85b9d78e578ec723a708abc4

  • SSDEEP

    49152:Aa5dRh/rrdcQX7kAmen7jJRkNkdKiJZeKtH0LzHPzkRyq/cHG53IpOMb6tdz6c:Aa5rJ/+ewIH/5dKaZeQH0Lc8GKAdz6c

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://awwardwiqi.shop/api

https://locatedblsoqp.shop/api

https://traineiwnqo.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe
    "C:\Users\Admin\AppData\Local\Temp\2c52f6d1206bc754c5e3ad485b7406d7d611d7d490a2252a969f2cd874ea9569.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:2304
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p151921358818216190771159712614 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1528
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_9.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4456
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_8.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2472
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_7.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4916
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3556
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3644
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1480
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2504
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2340
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4996
        • C:\Windows\system32\attrib.exe
          attrib +H "nRQUvisZS5yyGTCGUs.exe"
          3⤵
          • Views/modifies file attributes
          PID:2888
        • C:\Users\Admin\AppData\Local\Temp\main\nRQUvisZS5yyGTCGUs.exe
          "nRQUvisZS5yyGTCGUs.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:716
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5040
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1208
              5⤵
              • Program crash
              PID:544
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1188
              5⤵
              • Program crash
              PID:2072
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5040 -ip 5040
      1⤵
        PID:3748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5040 -ip 5040
        1⤵
          PID:1324

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

          Filesize

          2.2MB

          MD5

          43aae2a6566fde0ba4bb6ac7eb8a2d9b

          SHA1

          600e2399cf9f11ec75b17729e5e770188d0365c1

          SHA256

          2a9584d775535aeeb4efcced681b478401daa051ed5d93e3401d393e3a3d4d8e

          SHA512

          027951b64a4d68aa11c5c52d7df3d1238bb8b02ffc85a966cbd1758ee81826611f928eaea3c438fc7006176945eb45424b22a414a0fdebcbfe85bf31d36610f0

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

          Filesize

          702KB

          MD5

          ba3f5afa1e53146b404395483712fb14

          SHA1

          70c5c1c73e8891a56429b3a3fdf0bb1b3cb9ec54

          SHA256

          62b209a7385464459f6c34fd31d160a21b38dbcb627ddb7ef9f1f4b7567f23f9

          SHA512

          ba77869f1a4eb60cad2b9346de775317be6a20e884e6689539355d57e14678a5f13c3adfd44671d7831f57c9e1587f9a7736a4e80f98f58a5cdbefd47f983834

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

          Filesize

          702KB

          MD5

          e750fba0b64391a934fb93b3753529b6

          SHA1

          d3028d85a7052c9a59cfc6d89a8cdca6459bc460

          SHA256

          a2e6b8d81e5322eeed80bc3d4b6da3ab0574fe9ff3c4b49e30c0f7159c3369c2

          SHA512

          33f7b1dc3f4193028218b4250d6786aedcc3a3333ca940b6ff582ece60ec4564774114547acf5eaecbdb89b7e850695cc6c27e0ddc9963027407101158f2b2a6

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

          Filesize

          702KB

          MD5

          a9f77d700719afd4bb038e7aed531344

          SHA1

          1462339d5c807a76dcafb2656b6aca6ee0d60666

          SHA256

          7df19bca8feab85046f19831d1874fbc3fadb9e30a392d7375f50aac174d6123

          SHA512

          ae5851a887ad2796651b5f1dd59115f0bb00c509029d1999d9f54a7e5f231eb8f98f51b9ff06e94c3d9bbe436bb9ef21aa4740a3cbe84ae695ad8ca0ce448c45

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

          Filesize

          702KB

          MD5

          8c6e76beb87b9cfff64e5a54f1c227df

          SHA1

          05c40771381d42b88fd7ca1c4a57b55391def50f

          SHA256

          cf2c06ccde56e42374647c1cb39563f236b2088b312be3cd68f66a1effabdfd8

          SHA512

          946ded739baa321c7d5162b210d3117d4bf5751ed2fe413d674e2c2f6c2e836b73b5b4731c360bcc79509de50d7051d68fcf2b181bfe9cee6787ca9d882ac545

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

          Filesize

          702KB

          MD5

          9c177f44457d3a1589f64dacafcf5ee5

          SHA1

          3e561635879d9b5b3337fe92426386890634e55d

          SHA256

          599a40d0ac901e9fffcabde40f74474126c260c215d45ac0f6c479ab222a6243

          SHA512

          1646bea1b5eabeb28cb0713d7ec4b6010390280c0f36cba5e145ea65a4d4ead520dee70ec3be5c269c6500c3a306a1e4abc86ca3752d5653f957101768155594

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

          Filesize

          703KB

          MD5

          e8c36f78487d680955ce66b9e56c5cea

          SHA1

          89b90f78f7db329662a10d8d555a6fb3f0970806

          SHA256

          8057b11b42ea9d4213d9677567b59b020172e97119a8c0150a96be3373b819b7

          SHA512

          b39fbea1273090eac573a755cf33e29b202b473310362e7a54362caed8c2289809c2bc3dd902833f71f7a67799b8a992a994bcee3d0bd7bc2dd6f242e5018834

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

          Filesize

          703KB

          MD5

          79b83d924dfe491fbbd357d0d2ba3537

          SHA1

          ce1c477e380c6c1baf4fe7ee947e7893edc0d8ec

          SHA256

          28012fb4ed536207b7ed824424c0ac2550286c3d5c64ea10a8645143ed2fdf20

          SHA512

          3f5e6b889204874cbeb8234921d5e916d1529231f5dd1bd52781748bd7a88ae07ed409b251fb5d67a3479930791a4fb7914ee162791242fe694cc41b89f74ed7

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_8.zip

          Filesize

          703KB

          MD5

          e43b1a119fd6e09912cf4a1c9e5380c5

          SHA1

          678fcb1d3ece3bc0ad7a05bcf3edf6a04890f9a8

          SHA256

          005ad39af288f4a11564c88a14528df929da1a5bff930af6a803c173ca6c9b19

          SHA512

          d7f35adeabdf407a34eb462bdc6cd5958d107a7fe8fd55ce708283bfbf938047c5f8044a529c698e69fb74122920d413cae53bb89afa3fb2669c0152fd31a058

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_9.zip

          Filesize

          2.3MB

          MD5

          9c466d3f3e802906a978cd14705a36cd

          SHA1

          4b48f197c94725b7ea61d438ba14717bc5587efc

          SHA256

          73ca27aa83e83f8609e41055c71b0715e2ba2c2759941bf0733164c11ee41138

          SHA512

          7238582f31aff809015424bccdba310459c9ce8e29efbf47c961a302e3dbf4a8c436b393bdae6097abe168bcf7d5b407d1ef4b4552633938ba997ccd122f3289

        • C:\Users\Admin\AppData\Local\Temp\main\file.bin

          Filesize

          2.3MB

          MD5

          b4581612d06dbbd6009168d180b71b75

          SHA1

          3a351b6fcd554ffd1da0c5d56cf49461fb9a9a11

          SHA256

          ddeba62b92a2abb1f230bcddfcc56cccd6f9e7f15bd536a0cc699a2133b57123

          SHA512

          83fd082a9463adced28c938232daae549d534dbbb91296c0167b917fcb97020ab478918810a5bfaf177f1733569b0482ed4bd6b6e9dac9220803170390dda9e0

        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

          Filesize

          521B

          MD5

          a0aaf1fd029e946cc8ab2628aa972729

          SHA1

          280ebbf12eb0344a39b44a445090b24bb8c1569d

          SHA256

          7571848c9299ddeaa782dc55b48ecc6fccaf77ccc7decdab6a7cc63f4d8b202e

          SHA512

          03e33ab4f4e787ecc9c07ee9f7ca9b1839a22998a206b971c51db60cd8d41465bdf84b00fa50564052750e20c0636a8546c4e830488fade71391657dc61bbe39

        • C:\Users\Admin\AppData\Local\Temp\main\nRQUvisZS5yyGTCGUs.exe

          Filesize

          870KB

          MD5

          a5e9a6102f073ccde190fa1c6bea9d5f

          SHA1

          1a5d427d0738c8da04dea72a15b1cda76c361336

          SHA256

          46d02b58dd26cc524064d5fbe0a4f2a54d97e5b01d524c1a1beedeb54079f10e

          SHA512

          ee89f3aa7160550c9e7a5ab5c8dec5c5c43092f84a198af3e1bea221bdfd9dde7280130012ea5262fcdd350c0261dd3ab054e2c9eee0b81611b2f0e4b5e00ee1

        • memory/5040-80-0x0000000000160000-0x00000000001B2000-memory.dmp

          Filesize

          328KB

        • memory/5040-85-0x0000000000160000-0x00000000001B2000-memory.dmp

          Filesize

          328KB