Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
193s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/09/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe
Resource
win7-20240903-en
General
-
Target
d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe
-
Size
20.4MB
-
MD5
0bd8936501f04777f9c8684b417b6399
-
SHA1
eb52cce26eec7d1de3bc393ade790bbb88704290
-
SHA256
d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74
-
SHA512
d6a4f5194087329ed58a954ea5416862c630ef90f09d298ad7363c82962e032c23cda1b6adfd9a700db473aca0d3451cec03577157f41a58ee893ce47dd73ca9
-
SSDEEP
98304:uj73A9wWJFS2ne1qk0N7gnFJAUgsHYD4waLdZhWCxHQh:NBncOsFJksHgaLzxHA
Malware Config
Extracted
lumma
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73 PID 2916 wrote to memory of 2028 2916 d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe"C:\Users\Admin\AppData\Local\Temp\d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2028
-