Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
Release-x64.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Release-x64.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20241007-en
General
-
Target
Release-x64.zip
-
Size
19.6MB
-
MD5
25493ab271580066a0d5e8d43b25e055
-
SHA1
f2a8336d1e6a75233f796fe37ec00aa204fb6907
-
SHA256
5281883011b847e4ab3f68c7488a47fb8489ac802c558a2cb1e5bef588f06269
-
SHA512
41728fc89da12faca4fa738f5ef48cd1d7fd1c9b82151f9d011f4079611d0e7fdc7a06503a07a469a89b9de0424404b547bd89e5678da73a8dfa89668932deb1
-
SSDEEP
393216:oyzn8HaG+RVYNVwS8+1Kd7qI2R/Ri977qCWEyeEcTeuoIJKxoJe4B2:Zn8yV2Vw7+10qbKzEcquoAKxogM2
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 3 IoCs
pid Process 3552 Bootstrapp.exe 2160 Bootstrapp.exe 4304 Bootstrapp.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4960 3552 WerFault.exe 101 2340 2160 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapp.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 7zFM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2632 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4152 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 4152 7zFM.exe Token: 35 4152 7zFM.exe Token: SeSecurityPrivilege 4152 7zFM.exe Token: SeSecurityPrivilege 4152 7zFM.exe Token: SeSecurityPrivilege 4152 7zFM.exe Token: SeSecurityPrivilege 4152 7zFM.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe 4152 7zFM.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2632 4152 7zFM.exe 87 PID 4152 wrote to memory of 2632 4152 7zFM.exe 87 PID 4152 wrote to memory of 3552 4152 7zFM.exe 101 PID 4152 wrote to memory of 3552 4152 7zFM.exe 101 PID 4152 wrote to memory of 3552 4152 7zFM.exe 101 PID 4152 wrote to memory of 2160 4152 7zFM.exe 111 PID 4152 wrote to memory of 2160 4152 7zFM.exe 111 PID 4152 wrote to memory of 2160 4152 7zFM.exe 111 PID 4152 wrote to memory of 4304 4152 7zFM.exe 113 PID 4152 wrote to memory of 4304 4152 7zFM.exe 113 PID 4152 wrote to memory of 4304 4152 7zFM.exe 113
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Release-x64.zip"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO83076CF7\README.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\7zO830A6EA7\Bootstrapp.exe"C:\Users\Admin\AppData\Local\Temp\7zO830A6EA7\Bootstrapp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 13563⤵
- Program crash
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8305EB68\Bootstrapp.exe"C:\Users\Admin\AppData\Local\Temp\7zO8305EB68\Bootstrapp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 12963⤵
- Program crash
PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8307DE68\Bootstrapp.exe"C:\Users\Admin\AppData\Local\Temp\7zO8307DE68\Bootstrapp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3552 -ip 35521⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2160 -ip 21601⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD53b4bb14e17a60137e3e93c7adac41bcb
SHA1de09ed28df13d9325e816d0c656582a929077876
SHA256bde691c014e6a2527d5ef783d065edf14bcfe83b20c1ff97c22d280633b5287e
SHA512ec76f39b6ab4c6f822a1777c78212d659d86760458da9f050fba48bef12cba054573f25fc96278b49cdb163bed41a157123c01d3897226584cd1b57a653dfb50
-
Filesize
303KB
MD58b4b611f189dc2c0da8f0418a4f75a48
SHA167da157c8da2ee1deb30472e06cacca5c1918d5f
SHA256c06c92f33a0f706400bac3cb9174e27d95a995bd69886bd7e779638813483c78
SHA51293cd273d5d0525e92340434cb4a255c8d2dad8db24a2cbb0d78a1a5be41ecdafd835971bed638e98e546bfdcd59151a8d2219a4fc307a50b8e22b6b928136e58