Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/10/2024, 05:00
Static task
static1
General
-
Target
NеwIn.zip
-
Size
99.0MB
-
MD5
cf4f95535261f85ecc33cb988ba50e47
-
SHA1
3d0d44f95b4411fa5f6ea65d1e6e6a1a5014e511
-
SHA256
997320ef48c4471750d311a9c12e7fe2afc922eaff1451957a73c8bdb38a168b
-
SHA512
d17504fd06f455e35327fd4fd8c571d96ad4a6d8a0427190d5f98c61842a869a05f636b774b70169da72cf5bb8cb9a1a1bb88a0140bf664759409ace9faa9834
-
SSDEEP
3145728:AEzbbh9hqhTmO14qQ1u1Ce3Mn9WVaFC6yEW:1vhaTyJ1ugmMn9WVSmEW
Malware Config
Extracted
lumma
https://drawwyobstacw.sbs
https://condifendteu.sbs
https://ehticsprocw.sbs
https://vennurviot.sbs
https://resinedyw.sbs
https://enlargkiw.sbs
https://allocatinow.sbs
https://mathcucom.sbs
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 4964 NеwInstً.exe 3156 NеwInstً.exe 3836 NеwInstً.exe 4684 NеwInstً.exe 1396 NеwInstً.exe 2976 NеwInstً.exe 2648 NеwInstً.exe 2496 NеwInstً.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4964 set thread context of 3836 4964 NеwInstً.exe 85 PID 3156 set thread context of 4684 3156 NеwInstً.exe 92 PID 1396 set thread context of 2648 1396 NеwInstً.exe 103 PID 2976 set thread context of 2496 2976 NеwInstً.exe 108 -
Program crash 11 IoCs
pid pid_target Process procid_target 728 4964 WerFault.exe 79 3956 3836 WerFault.exe 85 4992 3156 WerFault.exe 83 1752 4684 WerFault.exe 92 1044 4684 WerFault.exe 92 1140 1396 WerFault.exe 99 1572 2648 WerFault.exe 103 3160 2976 WerFault.exe 101 1532 2496 WerFault.exe 108 4652 2648 WerFault.exe 103 2244 2496 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NеwInstً.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1984 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1984 7zFM.exe Token: 35 1984 7zFM.exe Token: SeSecurityPrivilege 1984 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1984 7zFM.exe 1984 7zFM.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 4964 wrote to memory of 3836 4964 NеwInstً.exe 85 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 3156 wrote to memory of 4684 3156 NеwInstً.exe 92 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 1396 wrote to memory of 2648 1396 NеwInstً.exe 103 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108 PID 2976 wrote to memory of 2496 2976 NеwInstً.exe 108
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\NеwIn.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1984
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:232
-
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 13723⤵
- Program crash
PID:3956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 2682⤵
- Program crash
PID:728
-
-
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 13283⤵
- Program crash
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 13203⤵
- Program crash
PID:1044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 2162⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4964 -ip 49641⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3836 -ip 38361⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3156 -ip 31561⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4684 -ip 46841⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4684 -ip 46841⤵PID:3636
-
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 13243⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 13283⤵
- Program crash
PID:4652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 2362⤵
- Program crash
PID:1140
-
-
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"C:\Users\Admin\Downloads\solara rat\NеwIn\NеwInstً.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 13163⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 13243⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 2482⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1396 -ip 13961⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2648 -ip 26481⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2976 -ip 29761⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2496 -ip 24961⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2648 -ip 26481⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2496 -ip 24961⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5a39c984c47cf1dbdd2066dbd0a52720b
SHA1149104d94174b167116de4a6ffd32e40f340360d
SHA256f53e85a6beb406953dd12a4270fdef5d04105ce0511e4c26a6b4069dfd90d839
SHA5122bc06ba4f547a345d14a9f581bfe7b308c3b1de7f5c096931d00e4e0ffcf74c83ec02b04a99eb9c395779a881ef8dcf3f9b8684ce82d0e906b096b2da88234d6
-
Filesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
Filesize
153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37
-
Filesize
3KB
MD54287d97616f708e0a258be0141504beb
SHA15d2110cabbbc0f83a89aec60a6b37f5f5ad3163e
SHA256479dc754bd7bff2c9c35d2e308b138eef2a1a94cf4f0fc6ccd529df02c877dc7
SHA512f273f8d501c5d29422257733624b5193234635bd24b444874e38d8d823d728d935b176579d5d1203451c0ce377c57ed7eb3a9ce9adcb3bb591024c3b7ee78dcd