Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
331s -
max time network
332s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
240830-rf46aayhpm_pw_infected.zip
Resource
win10v2004-20240802-en
General
-
Target
0VCartoonizer_Trial.exe
-
Size
16.0MB
-
MD5
1491fde71a72c411941e4f457589e180
-
SHA1
302946889bb43538ad2c2d5a644123ad2fbbca69
-
SHA256
8dd53f8f2686cb3946bec35e46ff067ec4b94f789f48db0f823b1633ee39a633
-
SHA512
d21250b4d7065511d6df273f8d3bada1d56cc3a969c334062b6e8167faa06c099dbc8209cc7c423ba30bc53d93ff4329235151c8c26ac6a3f3eeed7335567424
-
SSDEEP
98304:yBRT9Dey62EBcIMghQ8OjuyenJaoWxJEbisDNGPhssr7Ut/QYIano2OUvDXWQyng:gp+DpSqQoWbE/5srTY5qROb
Malware Config
Extracted
lumma
https://greetycruthsuo.shop/api
https://condedqpwqm.shop/api
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5016 set thread context of 3012 5016 0VCartoonizer_Trial.exe 90 PID 3624 set thread context of 808 3624 0VCartoonizer_Trial.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0VCartoonizer_Trial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0VCartoonizer_Trial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 5016 wrote to memory of 3012 5016 0VCartoonizer_Trial.exe 90 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103 PID 3624 wrote to memory of 808 3624 0VCartoonizer_Trial.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0VCartoonizer_Trial.exe"C:\Users\Admin\AppData\Local\Temp\0VCartoonizer_Trial.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\0VCartoonizer_Trial.exe"C:\Users\Admin\AppData\Local\Temp\0VCartoonizer_Trial.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:808
-