Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 05:41

General

  • Target

    Iaunch3r_Esy.exe

  • Size

    41.0MB

  • MD5

    b4dba5f4370f7a53e344242d825ade1e

  • SHA1

    4729b3a56191a404db64dca448f00d0b449dc53c

  • SHA256

    d2f9f3c9ac687269f2f17d62a25206b92e474110afe8a88236f939c2e16eb671

  • SHA512

    ea58d903ce96f696b68881624150a5ea97219cd4c8b80a7b7d95faaa1d670b00e22a07a26177702fbb93f1e146404043f2b21d3d2a6972a897a88c88610d2467

  • SSDEEP

    196608:sytkzBQ9jn+rbXakHieCo+1E2MqG/Qi7skfvVsfzj1o3qs1aVk:sseBQ9D+rWL1q/Qi78do3qs1a

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://richardflorespoew.shop/api

https://strwawrunnygjwu.shop/api

https://justifycanddidatewd.shop/api

https://raiseboltskdlwpow.shop/api

https://falseaudiencekd.shop/api

https://pleasurenarrowsdla.shop/api

https://feighminoritsjda.shop/api

https://marathonbeedksow.shop/api

https://backcreammykiel.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Iaunch3r_Esy.exe
    "C:\Users\Admin\AppData\Local\Temp\Iaunch3r_Esy.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4708-5-0x0000000000840000-0x0000000000894000-memory.dmp

    Filesize

    336KB

  • memory/4708-9-0x0000000000840000-0x0000000000894000-memory.dmp

    Filesize

    336KB

  • memory/4708-10-0x0000000000840000-0x0000000000894000-memory.dmp

    Filesize

    336KB

  • memory/4708-11-0x0000000000840000-0x0000000000894000-memory.dmp

    Filesize

    336KB

  • memory/5052-2-0x00007FF7C4290000-0x00007FF7C6C4E000-memory.dmp

    Filesize

    41.7MB

  • memory/5052-7-0x00007FF7C4290000-0x00007FF7C6C4E000-memory.dmp

    Filesize

    41.7MB

  • memory/5052-6-0x00007FF7C4290000-0x00007FF7C6C4E000-memory.dmp

    Filesize

    41.7MB