Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
lux megumin by DivineSkins.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lux megumin by DivineSkins.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
META/info.json
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
META/info.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
WAD/Lux.wad.client
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
WAD/Lux.wad.client
Resource
win10v2004-20240802-en
General
-
Target
WAD/Lux.wad.client
-
Size
37.9MB
-
MD5
6b7276d9e87b4dbad01a0074951f8a7f
-
SHA1
3d61262c0239fb1850bcfccae62325c0aa98ce57
-
SHA256
789882c974ede771fffae36404bd07780da56dfe728b2387c1b064f7701c630c
-
SHA512
5e00c3c754d9349a08e85a348c609312063c2c5f3389664f644bd77de0b8cdfefad493d512f16e05df9bff86a37d51fb99f94eefa5e6b061d98dc59073b1a261
-
SSDEEP
786432:IN30ZeCQRkTogmGrzN4ysIQtiNyOuuE1/X6dPPPPPpwGOEBb6DbRQYF+jFE21SVY:INWnToPSuiduH6oGjb2bEjFE21SVDk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\client_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\client_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\client_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.client rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.client\ = "client_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\client_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\client_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\client_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1448 2388 cmd.exe 31 PID 2388 wrote to memory of 1448 2388 cmd.exe 31 PID 2388 wrote to memory of 1448 2388 cmd.exe 31 PID 1448 wrote to memory of 2712 1448 rundll32.exe 32 PID 1448 wrote to memory of 2712 1448 rundll32.exe 32 PID 1448 wrote to memory of 2712 1448 rundll32.exe 32 PID 1448 wrote to memory of 2712 1448 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WAD\Lux.wad.client1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\WAD\Lux.wad.client2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\WAD\Lux.wad.client"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52d024a09ecba3fd4f38bbecf88acf900
SHA195960b0d8fa6a7d79332885ddc19402d476a87fe
SHA256587d7fe9f88e72582584a8fd475af8ed1f0a8806503b70f16cec8c005cb78002
SHA512ccfd7ab10f1998e7362e645c3297d8de8d2c23b2e2bfbc90761bebc7f92803595ec190ee00cdad6cf851c728eded33ec0520e658ec479b99ef9b9ec928a0084c