Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 15:09

General

  • Target

    loader.exe

  • Size

    502KB

  • MD5

    b8c9ebe29974dcb1dc86a2824761e81f

  • SHA1

    27f0f4b99d4d133202375676162772728e2a521d

  • SHA256

    bf5a7c45acb967fd5245aa00d88634aece445c298d783add2c5158b30ab726ac

  • SHA512

    b3d2a6781ddee7ca4a4011674105818a68025f820bc4b7bdb83097df7b0cd276d3b5b849c5cb669b10d048f7e99aa4951da51203fb98475e63f4e14babb14178

  • SSDEEP

    12288:gtGd6u3kxI05BOacVyXiIteS1D1wFobtFPFEuo8:gYb3owVydtFPFE1

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://benefictioraikiitso.xyz/api

https://singerreasonnbasldd.xyz/api

https://surprisedscaledowp.xyz/api

https://clerkpolicemandwusi.xyz/api

https://matterrydamagedowkds.xyz/api

https://fiondationkvowos.xyz/api

https://voyagedprivillywk.xyz/api

https://spitechallengddwlsv.xyz/api

https://varitycookypowerw.xyz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2936
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:2996
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 312
          2⤵
          • Program crash
          PID:932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2988 -ip 2988
        1⤵
          PID:628

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1080-1-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/1080-3-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/1080-4-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/1080-5-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2988-0-0x00000000011D0000-0x00000000011D1000-memory.dmp

          Filesize

          4KB