Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2025, 13:41

General

  • Target

    ReleeseBoostrappers.exe

  • Size

    1.1MB

  • MD5

    1c8f61ebae1e301d9b521e2e4661ea71

  • SHA1

    e4419155b9e29c822bb82430222a466f8d18c979

  • SHA256

    04cb3fda38692e884e8782a79b4b431cc2f50a3a0a7bd4c368f35df4b536e6ac

  • SHA512

    c09777c8d426b3320c2cbe828b20dfe516773d28a8f24f8c1e58ad1bbcf838cbf3eaa6b0960a0ea2b939d1beb38c9a321681afe24cd49878c9cca9563c75bb50

  • SSDEEP

    24576:zFKaf+2MOlrq3F1rjhrRQirOO3GrR1YNgjUytyVXyoso+fvVBZM04k87:Zdm2Hl2VveRH0yoD+nZMn97

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ReleeseBoostrappers.exe
    "C:\Users\Admin\AppData\Local\Temp\ReleeseBoostrappers.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Recognised Recognised.cmd & Recognised.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2840
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 484968
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2656
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Ratio
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2540
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Forgot" Maui
        3⤵
        • System Location Discovery: System Language Discovery
        PID:568
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 484968\Trackback.com + Face + Terrorists + Thehun + Closure + Roller + Reception + Nested + Wichita + Casino + Clicking 484968\Trackback.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:920
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Powerseller + ..\Pn + ..\Accreditation + ..\After + ..\Continent + ..\Risk m
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2128
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\Trackback.com
        Trackback.com m
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2016
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\Trackback.com

    Filesize

    854B

    MD5

    88a3b03e13c9c4f5f5d8bf523c571819

    SHA1

    160f7260f5d7b13f4159bfd66e1596bfd5f81ffa

    SHA256

    b9d5b1f216686bf0fe3103d6ff7e51232fda59c229c8642adb634a7e2f25d695

    SHA512

    0c648a181d18fb81922b7d1cc86978952a1c260ee2f39d10dc3f47bac4e07f54786685985bf37702fcb4ec7704807668330b5c26c96499be1399786e65e5582f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\m

    Filesize

    456KB

    MD5

    1208de638bf5ec8549a3a09ba88f2404

    SHA1

    16cb4eee76e7527e21b5c4467c6e1907de96a6d4

    SHA256

    d077914235e2ffb0516f463c8d04363f8e18cdb9a1c4b100eff0eac04b509763

    SHA512

    b1c635700643b79348c07023159baf231ad537b48af7014200d8fc802fd17673b39ef167364097f94297aeb404541b9a288d429db546edb426821f60d217512a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Accreditation

    Filesize

    78KB

    MD5

    5c812305ef850825e0431d590c9f014a

    SHA1

    723edb8aa608ba648f3873fe703fad617afb8763

    SHA256

    2c0eb2ed785a99f0efe56396331ddd8ff86c1c7d6aa5b4bc65b5b028272e81ce

    SHA512

    6bdc92450d9793250e75e2a93544a98db3fe0b1ee73b58a51ab897fd9a2d5dbc10a2a88a758b7ae8049b6648edc23ceb5c0005deaaf406c6d438f9349b1f4541

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\After

    Filesize

    88KB

    MD5

    5bf24e597eb2cf2f9d542f5151142951

    SHA1

    239522e709f4d3e6e4f8452b783b3714b58587b9

    SHA256

    03bc9e33000bef75e35a1c0cc3e05a86062b63da7eda2586b0eb711030e9a5c0

    SHA512

    17b609d9ffada36820ccc40b6bbc0539ed0a7373d0028654d9fe09f36a62e278d0ef239a94d13c6eace2824f6e5a17aed9adf7617574b87ac5ab842fa11d1300

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Casino

    Filesize

    119KB

    MD5

    227bf9bbec8408a10b1a4a289ba77401

    SHA1

    86cf90b141a11ee7d27bea1807dc959aaae5f583

    SHA256

    a5277b8fa9b6f77ca6431d5c32f15f317c52f1efb7f88dd8521a585d902586b4

    SHA512

    a5c79ec530f449479cb138061f8b79a5d9d79d9d7bb854461059891c230a43a9c1843201cde47bf90e87fcb500ff31d98bfcedcc57079158848494f18a812c7a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Clicking

    Filesize

    58KB

    MD5

    76f557310c653be04b4f805e0c6397c1

    SHA1

    7e7fe5eef7b32f4455b6968c5e970eaf88da15d2

    SHA256

    c87c041619d47aed9b511042f2b4d6fba3862dfe6206818fa4570ad5a663aec1

    SHA512

    d9eb65aecf654d317566615c9176ab814c05ec5394aef942f8f13506833bb94ed669cfd8988f3821afd73b2b415d3ebe421f761bd50f98d5d4a7542b7b0d81f8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Closure

    Filesize

    58KB

    MD5

    2077269e8ec2aaa990d23f0647dd4eed

    SHA1

    e2795853dba57687b71bf235165fb16eabd4723f

    SHA256

    3c5323eda19b2fafdd64a38ec9d9018cc8deb089fe9536398678777fbae8c8e4

    SHA512

    ad85ca9163a6a06e3a5199efc51890524f6ba1ee9054f1315b3629467784d10b66489332997b8688372363c0d57ac44c71a86e5aa0c5b651ad568badb49de49a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Continent

    Filesize

    66KB

    MD5

    5f746768bb2de3ced707b70288ac4733

    SHA1

    635afd41fbcd920a0f9437d0fa0b7ed3ba02ce8b

    SHA256

    2dd65c4135b9ff60a415cc6af53816177bf16a0a6f1866c738d5a9efa8a98f99

    SHA512

    c78c287126269ceb8f9bcd20e2b2f4c7e7a4b7964aa20b08c2b1e45ceb329f6e2dcf6ccbe92b5153745510d5ec1dcabbaf3d194ff96eadfb9d0ff81e312e3b18

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Face

    Filesize

    53KB

    MD5

    6f640def208d9e8360bda93298464fcf

    SHA1

    00b920245f01e6fb4c9cc11af17f074373fca79b

    SHA256

    f3393f291a3859b1eee2c7c3633bda2117feddd81540e0df92bf50cb04468c66

    SHA512

    aa712dfeb76e5b1c745059df65f46cdceda9a6c6ca1a2519c539d64bdc762bccda59f1cd58b5499e773d89520443b9364ba56b09f7a1d955b0b1e6e539aeddb6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Maui

    Filesize

    860B

    MD5

    20514b7861da2bda60ab3e5457c55a25

    SHA1

    d088ba8f1d59357d491bd3c845314240a0dd1e4f

    SHA256

    a16dcc3dbeafbcadb2f63140ab693cdf23ce6e952a723e87af3de5d95e69cc87

    SHA512

    bc2fd3209fbf3af101614f7df8b9199efa16f10d498ae5226a148db2d7dac2ff04dd8c8880c35be020f1e4ce8e57098682502162b656a7ec55b8c17e81baccca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nested

    Filesize

    91KB

    MD5

    9d13f05b9a71d8dde2e77812714f89be

    SHA1

    cbf85b87fe308c764d7c8c0a4b0055e0b29d1e7c

    SHA256

    c2683a6e3197d6524b212d53a5df1244a06e40056f7b79ec0733496f96f8fc18

    SHA512

    2884e6653e971366993453318fe102231ff3180d77d00d05374d7a45c2863e4fa9fadad3949f59de9c8282ea086cd201e10f96a13c8a9941a7659726f6b75d81

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pn

    Filesize

    99KB

    MD5

    1f5464a2486392bafdc858cf0cd5a4d2

    SHA1

    817153c40b0cab258565a6e4e9704ec8a1a4e33f

    SHA256

    5a79d5e3b8cf1466872be8ae6097d7bc68c23ee0aeff1b05cfa6340e2f0ff9df

    SHA512

    c68c196ea077e56a83a994ed1c8d7b80307f73c908cd1da4af0bca8eaf051f5cce0e77d7c6b3a7ae6b2589f692c28019b6aac88bf2f68914c265a1bd02642322

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Powerseller

    Filesize

    63KB

    MD5

    085b6cac39e894bd415175322c5c70a7

    SHA1

    258db05f3be1d0bcdeaacefeb392f5a29ed99353

    SHA256

    cf04190c6b7609df58042c6b603eec15ff543a1c815a66bb0f09b7ec95e6effb

    SHA512

    400331e5ccb51bdea7b1e7af1c84af741f07464ab90094869ae51fea88db9461a80769fe6ddb789a0be423da9dc903e9bc979509c72e5490846dfaf265f7db21

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ratio

    Filesize

    477KB

    MD5

    d3c0d6cd4f80f6509ab2f8963488f3d0

    SHA1

    ee272122bc647d5bbd6e21cdb97245d5a1dd0763

    SHA256

    d5a172c7ae8f88117495c09d1bf3a469981ac5a540d082f9e39b0f39a1d5ca3a

    SHA512

    fb0afe20dc9b0b027cab3997b23772379c506afd5f7934e6108c59143611b187323808fb27d3f5d05377c6c3e49895440732841dcae39d2117eeaaef6b820e30

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reception

    Filesize

    118KB

    MD5

    21038b2994a294b39e33cc501c1a05ee

    SHA1

    50c1d712ed63fdbf187f1d9ac9addac3503a976f

    SHA256

    20ce780c417f346622d0476e9aae17c62324397a5fda7c5f8dbc8ed9c71fcc9b

    SHA512

    2ef16b3945541d0fa39fc1d3da4f6f3748207c4c68206c70838215d314f84e513d55cf890b410dc30d60fab25c8605dcb898c822c9711035afca028fdf4a5bef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Recognised

    Filesize

    21KB

    MD5

    e1b69dc2271076449b7fe047ac482984

    SHA1

    bcab3c731619749fffca84fca4d88756f3452cb1

    SHA256

    d281f964e56db7bb27148db0fbff842b4e53f123beade2d0e036f82d3a3a854d

    SHA512

    373c6af2e0a8dd1bebf34c4f897f9613a7d2843b07555b4c29420f3ac839384cd04b581529fc8e0cd16807442ba1c5e601e2f79cb132f8c284b09b9c4a9c7bab

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Risk

    Filesize

    62KB

    MD5

    cd7527fa445dbec2e8b3bad47de16929

    SHA1

    3970dc1a068fa614ffa6dfff201132af7dc84751

    SHA256

    1344291908f61c5461fe78f93f4748360052ddcd3391692f2148fc570ea4a06f

    SHA512

    8692c6345b3bcefffa519a16b0e7f1615e22e102cd1f3ab913c394cbc56ad55b269bf918953992596f1026533fa458452d0d8759c3f2394ed029e379c5c710a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Roller

    Filesize

    141KB

    MD5

    fa81f3538e7caf8ad17d26969d8d87ad

    SHA1

    5b06ff33e4aea6c59dcb6ea034ac085aea25774f

    SHA256

    fbc991e234bf9c4b48514cdcd02c2646e65203d4fde35c22490806e869dace4f

    SHA512

    2ca23e42a13676ad4e87f12b8c8d195d729c86f327c5a5fff317fe78f9cb9b7ef5c8c1982f53e1111fb8b46230569fc4bb287ac94dc0437c99ae669b4932fd1e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Terrorists

    Filesize

    64KB

    MD5

    1798c08ab7269e5dc50d97fa0fe4c1ce

    SHA1

    bdddb294c0d6792ebf3f3b9e4f4db2c2b95b6208

    SHA256

    5d4c0d897ed74e744542a76b03d67c292e6c28da120655472a2639abeda68207

    SHA512

    02883fd39426160aecb8f0507e9ba8a8015f70476217cce3a536270a574255f621616b0c2995d45cd41b726295b01ac22e777146462469f8cde78b84d35264ce

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Thehun

    Filesize

    109KB

    MD5

    7ce7c4ea5d8e0b48d5400093db7d6310

    SHA1

    b9d27c9f6349a24e9a163ff8e52f5b937be21758

    SHA256

    bc9279f5bdefd7b37e686f3347ee467661b9f68ca2d220630620416869780ac4

    SHA512

    0484767d0c8cb58221fda088f4202278b169da812c41e25bed66b3dd3ab4427d3cf968db3e7f20b6895eb3d1e1ff7a8a1dd490added2b9cac0600d30bea6ab07

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wichita

    Filesize

    113KB

    MD5

    d77a611d6b2a51a697a734dc7b0fc795

    SHA1

    106d523c59f63d6ced9391ad9d48891b75f63643

    SHA256

    e79eccddd759fc7247b2dd2ec942e1ed52ed1ab9eadf897c172c7eae25bc5d8d

    SHA512

    4fe6dfb75d51eb0508019350465c88fe6f9d870a3817dc0614857ca45effe1efedf33a680bb9fb2e3675744bc3db14981052d630f1f551108a81dbf406d7d081

  • C:\Users\Admin\AppData\Local\Temp\Cab8B03.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8B25.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\Trackback.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2016-70-0x0000000003690000-0x00000000036E7000-memory.dmp

    Filesize

    348KB

  • memory/2016-69-0x0000000003690000-0x00000000036E7000-memory.dmp

    Filesize

    348KB

  • memory/2016-71-0x0000000003690000-0x00000000036E7000-memory.dmp

    Filesize

    348KB

  • memory/2016-72-0x0000000003690000-0x00000000036E7000-memory.dmp

    Filesize

    348KB

  • memory/2016-73-0x0000000003690000-0x00000000036E7000-memory.dmp

    Filesize

    348KB