Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 23:58 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe
Resource
win7-20240903-en
General
-
Target
2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe
-
Size
3.8MB
-
MD5
c2db481feb9c25d44ed16b28e98f9146
-
SHA1
7252f5b83b930d537151babc7bf9f4b05b96a06c
-
SHA256
81a616d0cbbcb72c4c03bdcdcafc1379d94bceb1510cbbf04ba06681569f861a
-
SHA512
9bcc9a2d9d6ffc9cb43313a5ed8522306ee3a92c2df181836937d81655eb4801a60a08dcc7b6c186d06fb657d6feff60f48fd71b45a2aca48ceeb2635da096c1
-
SSDEEP
49152:xR/W9yhKrDPtTbvMr2aQPF7Ifxzce3qLz+LZwwhV6wN01EE66/1nF1KB7:xR/jitHEraLz9RSq
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31 PID 1960 wrote to memory of 3008 1960 2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-06_c2db481feb9c25d44ed16b28e98f9146_frostygoop_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3008
-
Network
-
Remote address:8.8.8.8:53Requestpleadragger.clickIN AResponse
-
Remote address:8.8.8.8:53Requestnearycrepso.shopIN AResponse
-
Remote address:8.8.8.8:53Requestabruptyopsn.shopIN AResponse
-
Remote address:8.8.8.8:53Requestwholersorie.shopIN AResponse
-
Remote address:8.8.8.8:53Requestframekgirus.shopIN AResponse
-
Remote address:8.8.8.8:53Requesttirepublicerj.shopIN AResponse
-
Remote address:8.8.8.8:53Requestnoisycuttej.shopIN AResponse
-
Remote address:8.8.8.8:53Requestrabidcowse.shopIN AResponse
-
Remote address:8.8.8.8:53Requestcloudewahsj.shopIN AResponse
-
Remote address:8.8.8.8:53Requeststeamcommunity.comIN AResponsesteamcommunity.comIN A23.214.143.155
-
Remote address:23.214.143.155:443RequestGET /profiles/76561199724331900 HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Host: steamcommunity.com
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache
Date: Mon, 06 Jan 2025 23:59:30 GMT
Content-Length: 25984
Connection: keep-alive
Set-Cookie: sessionid=fe8476ab98a5c67e8127dd6c; Path=/; Secure; SameSite=None
Set-Cookie: steamCountry=GB%7C7d625a3b038bb98f68b4e14dac147806; Path=/; Secure; HttpOnly; SameSite=None
-
23.214.143.155:443https://steamcommunity.com/profiles/76561199724331900tls, httpBitLockerToGo.exe1.3kB 33.0kB 18 30
HTTP Request
GET https://steamcommunity.com/profiles/76561199724331900HTTP Response
200
-
63 B 128 B 1 1
DNS Request
pleadragger.click
-
62 B 119 B 1 1
DNS Request
nearycrepso.shop
-
62 B 119 B 1 1
DNS Request
abruptyopsn.shop
-
62 B 119 B 1 1
DNS Request
wholersorie.shop
-
62 B 119 B 1 1
DNS Request
framekgirus.shop
-
64 B 121 B 1 1
DNS Request
tirepublicerj.shop
-
62 B 119 B 1 1
DNS Request
noisycuttej.shop
-
61 B 118 B 1 1
DNS Request
rabidcowse.shop
-
62 B 119 B 1 1
DNS Request
cloudewahsj.shop
-
64 B 80 B 1 1
DNS Request
steamcommunity.com
DNS Response
23.214.143.155
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b