Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2024, 06:51

General

  • Target

    16f12b1dd6e15d8620e688d8f2a6ccdf495cb39e3c2a3f7000cdf44b4a7dd518.exe

  • Size

    6.8MB

  • MD5

    c897141881dec59b8fd32eaa27ce2c03

  • SHA1

    ad2b54f4929061bb1c409690d24e3b9548f18fe7

  • SHA256

    16f12b1dd6e15d8620e688d8f2a6ccdf495cb39e3c2a3f7000cdf44b4a7dd518

  • SHA512

    e51dc6a096c0a5653bd36b7ec48f3567d6e999b9b36b384c941b08724000c3f8a899a6f9c12291e4fa4be7203c2e2597cafd17ef42058d7a6d1094529463fb23

  • SSDEEP

    196608:4msmE5QBX3qd+OVm+AZO+lZuSNbIwheVnIIb8CvOAY:t9E5gQPmVZOslhepl4CvOAY

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16f12b1dd6e15d8620e688d8f2a6ccdf495cb39e3c2a3f7000cdf44b4a7dd518.exe
    "C:\Users\Admin\AppData\Local\Temp\16f12b1dd6e15d8620e688d8f2a6ccdf495cb39e3c2a3f7000cdf44b4a7dd518.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W6R31.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W6R31.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3Y74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3Y74.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:380
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x91J5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x91J5.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:852
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1828
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2d7377.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2d7377.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 1592
            5⤵
            • Program crash
            PID:3956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k94T.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k94T.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o430m.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o430m.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Windows security modification
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3972 -ip 3972
    1⤵
      PID:4420
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4520
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o430m.exe

      Filesize

      2.6MB

      MD5

      4ef653b7c0b2083049ec369bf76276e6

      SHA1

      b1531fcfa3c4744449a3cc0444fd9c1c1053f262

      SHA256

      db1b5f45b4d394d73c28fa37ea9e2b096238587892667e7d574a7b907de3304f

      SHA512

      c9d9ae3f1125529f2bb7b35e7f4685639843ab5a681d4b13feab1951cbc417ad22042576456124e6a64682b4eeb83a9167cb700a75f605cbd1705888d2e081d6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W6R31.exe

      Filesize

      5.2MB

      MD5

      59a30322c3aa3c98cbb66797cb720d58

      SHA1

      938e66ceb323ddb3e281d4ed323b75856a59ec5e

      SHA256

      49c128b2ff23db5d654a7747938d941e7590ea17bbd64389aa29d24297e7e0b5

      SHA512

      700093f6e89eb1ef47ab70f2fd131f766877975fc767a88717b353b14d0f2be03e4717a6e7f632b1a8f69b2eef12abdab1cdc477bdc2fee32329afb6c90bb11c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k94T.exe

      Filesize

      5.0MB

      MD5

      00813aa6b3272ebd7d363865fae1370e

      SHA1

      3ca507112f3ea766e7932e54e29e51f60e20c031

      SHA256

      ea011a2eb689e17035978da04cb6d7babc0e641be71fb4c25be260e72b0b283c

      SHA512

      5e36c4178734f5d4e910e24ac267699ce997fcaf7ab51f0f41d671aa854e7d2cf039c3f77bb90939ace0d1355f362984265c9522c5c367765ced6029976c1176

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3Y74.exe

      Filesize

      3.5MB

      MD5

      47b4c336832554f3afa47a5361b7fd73

      SHA1

      2d6f90b7079ba3533f1a06e4cc50f598885b7167

      SHA256

      abfe4e6a6404e5cb76f30b8054118e1040a9dc9c9971ed0fe0faf895d541b7d0

      SHA512

      f08d46e6cafacc07c564a2c8a1d640d6a4d82e7a748209433bf497237f1951e0443f252eb1df0aaba2dbe009351df1db9123661a0a012136993677911787dced

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x91J5.exe

      Filesize

      3.1MB

      MD5

      3e7bf0e6ad4a50ed23dc8a48ac9d5efb

      SHA1

      5ae53d6260f8657be302ffafa5421c8da7f56f20

      SHA256

      1f577d7ad715ac84ad9d4db1d6d55f513ed6e55525ca2de0615d12ba438b857c

      SHA512

      67c0cb6fcb8a2946fc403d170606bc1c8eb226c080c96ad484afee475bcc6c0944846125c8afdc49dd312cdb6d19899d977b0ab26c3a2a3b2cb3f2e2328dc80b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2d7377.exe

      Filesize

      1.8MB

      MD5

      ab2846940eda92ca740e2990160f8aab

      SHA1

      e74f75e6cde1a9d74631a5bd2397a2de7ae3758c

      SHA256

      6456310ec737b7c6e008cfb8e21db0178fc1704d37f6abf414d1c6f81c104ba0

      SHA512

      f15970c49d26e91269ae46bd0d28b78e03493154cb4b91d2893915def6a69014fac305af20bace4a4091764e8f99940e094d0fd4f628712cd166d1f0561ec193

    • memory/640-55-0x0000000000960000-0x0000000000C0E000-memory.dmp

      Filesize

      2.7MB

    • memory/640-50-0x0000000000960000-0x0000000000C0E000-memory.dmp

      Filesize

      2.7MB

    • memory/640-58-0x0000000000960000-0x0000000000C0E000-memory.dmp

      Filesize

      2.7MB

    • memory/640-49-0x0000000000960000-0x0000000000C0E000-memory.dmp

      Filesize

      2.7MB

    • memory/640-51-0x0000000000960000-0x0000000000C0E000-memory.dmp

      Filesize

      2.7MB

    • memory/852-34-0x00000000004C0000-0x00000000007D2000-memory.dmp

      Filesize

      3.1MB

    • memory/852-21-0x00000000004C0000-0x00000000007D2000-memory.dmp

      Filesize

      3.1MB

    • memory/884-75-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/884-74-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-60-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-72-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-53-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-35-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-78-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-59-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-77-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-61-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-62-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-76-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-52-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-67-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-68-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-69-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-70-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/1828-71-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/3128-44-0x00000000009A0000-0x0000000000E9D000-memory.dmp

      Filesize

      5.0MB

    • memory/3128-45-0x00000000009A0000-0x0000000000E9D000-memory.dmp

      Filesize

      5.0MB

    • memory/3972-40-0x0000000000C90000-0x000000000112F000-memory.dmp

      Filesize

      4.6MB

    • memory/3972-39-0x0000000000C90000-0x000000000112F000-memory.dmp

      Filesize

      4.6MB

    • memory/4520-66-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB

    • memory/4520-64-0x0000000000510000-0x0000000000822000-memory.dmp

      Filesize

      3.1MB