Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/09/2024, 11:30
240928-nl7ltatcqq 1028/09/2024, 11:21
240928-nf634atakn 1028/09/2024, 11:06
240928-m7xhasvend 1028/09/2024, 11:00
240928-m4ehbavcrb 1Analysis
-
max time kernel
188s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Am I Racist 2024.HD.1080p.x264.Dual.YG.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Am I Racist 2024.HD.1080p.x264.Dual.YG.exe
Resource
ubuntu1804-amd64-20240611-en
General
-
Target
Am I Racist 2024.HD.1080p.x264.Dual.YG.exe
-
Size
726.0MB
-
MD5
23c6721db2334ba07163b4b55c6e4596
-
SHA1
fa072cbed04c62454dabd0caecc24114665fba88
-
SHA256
bb8df0a1dd931795822fe16aff7786ecc387ba809707d1dbd7886abe3d64da91
-
SHA512
55e10eb68e2c8bc63c1fb72fabb20c9c2307fd647260259066480531298cdecb08be0dce7c0086acd3b95102f3ed342632f4b9022a21a023cca3949c5f95bda4
-
SSDEEP
786432:bJ18G/IReWisoSjw67rMoF4vxnFhVHdI5yhWmeoxWY:bnUeAoSjjPMQsnFvHdgmeoxx
Malware Config
Extracted
lumma
https://gutterydhowi.shop/api
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 4360 2688 WerFault.exe 80 3116 2688 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Am I Racist 2024.HD.1080p.x264.Dual.YG.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5012 WINWORD.EXE 5012 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 Am I Racist 2024.HD.1080p.x264.Dual.YG.exe 2688 Am I Racist 2024.HD.1080p.x264.Dual.YG.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Am I Racist 2024.HD.1080p.x264.Dual.YG.exe"C:\Users\Admin\AppData\Local\Temp\Am I Racist 2024.HD.1080p.x264.Dual.YG.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 13842⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 13562⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2688 -ip 26881⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2688 -ip 26881⤵PID:908
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4108
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\AssertSearch.dot"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5012