Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2024, 05:30 UTC

General

  • Target

    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe

  • Size

    2.8MB

  • MD5

    290a55c8e419a34d8bff94799c9b90e4

  • SHA1

    1725eaeda7281dd4853b68cd2a4870f06286a873

  • SHA256

    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538

  • SHA512

    fe990fecfb5682543654c15a4d2ff80b7ec82de7f18a1903505e6627cbf4dfb1dd9f788453f3f0576deccded97523815a87664dffc5dc7090cc5cc97bc82395d

  • SSDEEP

    49152:Wk3HjrLjh6N+VDTcEi8Xrqgp1c+Fyz0Fo4A:H3DnjHBgEi87fp1cyyz8

Malware Config

Extracted

Family

lumma

C2

https://scriptyprefej.store/api

https://navygenerayk.store/api

https://founpiuer.store/api

https://necklacedmny.store/api

https://thumbystriw.store/api

https://fadehairucw.store/api

https://crisiwarny.store/api

https://presticitpo.store/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    "C:\Users\Admin\AppData\Local\Temp\807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2892

Network

  • flag-us
    DNS
    presticitpo.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    presticitpo.store
    IN A
    Response
  • flag-us
    DNS
    crisiwarny.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    crisiwarny.store
    IN A
    Response
  • flag-us
    DNS
    fadehairucw.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    fadehairucw.store
    IN A
    Response
  • flag-us
    DNS
    thumbystriw.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    thumbystriw.store
    IN A
    Response
  • flag-us
    DNS
    necklacedmny.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    necklacedmny.store
    IN A
    Response
  • flag-us
    DNS
    founpiuer.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    founpiuer.store
    IN A
    Response
  • flag-us
    DNS
    navygenerayk.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    navygenerayk.store
    IN A
    Response
  • flag-us
    DNS
    scriptyprefej.store
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    scriptyprefej.store
    IN A
    Response
  • flag-us
    DNS
    steamcommunity.com
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    8.8.8.8:53
    Request
    steamcommunity.com
    IN A
    Response
    steamcommunity.com
    IN A
    23.214.143.155
  • flag-gb
    GET
    https://steamcommunity.com/profiles/76561199724331900
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    Remote address:
    23.214.143.155:443
    Request
    GET /profiles/76561199724331900 HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
    Host: steamcommunity.com
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: text/html; charset=UTF-8
    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;
    Expires: Mon, 26 Jul 1997 05:00:00 GMT
    Cache-Control: no-cache
    Date: Mon, 30 Dec 2024 05:45:49 GMT
    Content-Length: 25984
    Connection: keep-alive
    Set-Cookie: sessionid=3521c9aaa6f5c3d3a32b2a36; Path=/; Secure; SameSite=None
    Set-Cookie: steamCountry=GB%7C7d625a3b038bb98f68b4e14dac147806; Path=/; Secure; HttpOnly; SameSite=None
  • 23.214.143.155:443
    https://steamcommunity.com/profiles/76561199724331900
    tls, http
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    1.4kB
    33.0kB
    20
    30

    HTTP Request

    GET https://steamcommunity.com/profiles/76561199724331900

    HTTP Response

    200
  • 8.8.8.8:53
    presticitpo.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    63 B
    128 B
    1
    1

    DNS Request

    presticitpo.store

  • 8.8.8.8:53
    crisiwarny.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    62 B
    127 B
    1
    1

    DNS Request

    crisiwarny.store

  • 8.8.8.8:53
    fadehairucw.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    63 B
    128 B
    1
    1

    DNS Request

    fadehairucw.store

  • 8.8.8.8:53
    thumbystriw.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    63 B
    128 B
    1
    1

    DNS Request

    thumbystriw.store

  • 8.8.8.8:53
    necklacedmny.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    64 B
    129 B
    1
    1

    DNS Request

    necklacedmny.store

  • 8.8.8.8:53
    founpiuer.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    61 B
    126 B
    1
    1

    DNS Request

    founpiuer.store

  • 8.8.8.8:53
    navygenerayk.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    64 B
    129 B
    1
    1

    DNS Request

    navygenerayk.store

  • 8.8.8.8:53
    scriptyprefej.store
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    65 B
    130 B
    1
    1

    DNS Request

    scriptyprefej.store

  • 8.8.8.8:53
    steamcommunity.com
    dns
    807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
    64 B
    80 B
    1
    1

    DNS Request

    steamcommunity.com

    DNS Response

    23.214.143.155

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabC7F3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC815.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2892-0-0x0000000001330000-0x0000000001634000-memory.dmp

    Filesize

    3.0MB

  • memory/2892-1-0x0000000077E70000-0x0000000077E72000-memory.dmp

    Filesize

    8KB

  • memory/2892-2-0x0000000001331000-0x0000000001359000-memory.dmp

    Filesize

    160KB

  • memory/2892-3-0x0000000001330000-0x0000000001634000-memory.dmp

    Filesize

    3.0MB

  • memory/2892-4-0x0000000001330000-0x0000000001634000-memory.dmp

    Filesize

    3.0MB

  • memory/2892-40-0x0000000001330000-0x0000000001634000-memory.dmp

    Filesize

    3.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.