Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/01/2025, 01:16 UTC
250108-bm46vszkaj 1007/01/2025, 22:37 UTC
250107-2jz1vatpdr 1007/01/2025, 22:11 UTC
250107-14bnbasrfr 1006/01/2025, 21:24 UTC
250106-z9bd3ayjes 1006/01/2025, 04:52 UTC
250106-fhgxzsyphk 1006/01/2025, 04:46 UTC
250106-fdzl8sypaj 1006/01/2025, 04:34 UTC
250106-e679eaymcj 1006/01/2025, 04:26 UTC
250106-e2kybawlex 1006/01/2025, 03:47 UTC
250106-ecn9favpcw 1006/01/2025, 03:19 UTC
250106-dvk43avkaw 10Analysis
-
max time kernel
4s -
max time network
7s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/01/2025, 21:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win10v2004-20241007-en
General
-
Target
setup.exe
-
Size
793KB
-
MD5
5b3e5ace672f4250aeb06382579d165d
-
SHA1
5f1d413192d92fa9a58cd5208963cda6c6c7c678
-
SHA256
1f8c9a3874f67a64d9ffff9f73d608d62dbd93a443404d969455e03b62e5fd48
-
SHA512
115551e9a8186986761c03d66928e432410b9c310f2dd862155cfddf1dd01133563a611e12998e898cbd78dce5ad8c2f4da923c5c2e3cec08d20bd38d644695c
-
SSDEEP
12288:d3K1Pp+lMeB8UODTAFKHMRTviTOODTAFKHMRTviTr:JK1PSMZx0FKsRTqT/0FKsRTqTr
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1048 1980 setup.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3560 1980 setup.exe 78 PID 1980 wrote to memory of 3560 1980 setup.exe 78 PID 1980 wrote to memory of 3560 1980 setup.exe 78 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79 PID 1980 wrote to memory of 1048 1980 setup.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1048
-
Network
-
Remote address:8.8.8.8:53Requestcureprouderio.clickIN AResponsecureprouderio.clickIN A172.67.132.7cureprouderio.clickIN A104.21.4.114
-
Remote address:8.8.8.8:53Request7.132.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestabruptyopsn.shopIN AResponse
-
Remote address:8.8.8.8:53Requestwholersorie.shopIN AResponse
-
Remote address:8.8.8.8:53Requestframekgirus.shopIN AResponse
-
Remote address:8.8.8.8:53Requestframekgirus.shopIN AResponse
-
Remote address:8.8.8.8:53Requestnearycrepso.shopIN AResponse
-
Remote address:8.8.8.8:53Requestnearycrepso.shopIN AResponse
-
Remote address:8.8.8.8:53Requesttirepublicerj.shopIN AResponse
-
Remote address:8.8.8.8:53Requestnoisycuttej.shopIN AResponse
-
Remote address:8.8.8.8:53Requestrabidcowse.shopIN AResponse
-
Remote address:8.8.8.8:53Requestcloudewahsj.shopIN AResponse
-
Remote address:8.8.8.8:53Requeststeamcommunity.comIN AResponsesteamcommunity.comIN A104.103.247.162
-
Remote address:8.8.8.8:53Requestsputnik-1985.comIN AResponsesputnik-1985.comIN A104.21.16.1sputnik-1985.comIN A104.21.32.1sputnik-1985.comIN A104.21.80.1sputnik-1985.comIN A104.21.64.1sputnik-1985.comIN A104.21.96.1sputnik-1985.comIN A104.21.48.1sputnik-1985.comIN A104.21.112.1
-
Remote address:8.8.8.8:53Request162.247.103.104.in-addr.arpaIN PTRResponse162.247.103.104.in-addr.arpaIN PTRa104-103-247-162deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request1.16.21.104.in-addr.arpaIN PTRResponse
-
1.1kB 5.2kB 10 9
-
1.7kB 43.6kB 24 38
-
1.1kB 5.1kB 9 9
-
384 B 706 B 6 6
DNS Request
cureprouderio.click
DNS Response
172.67.132.7104.21.4.114
DNS Request
7.132.67.172.in-addr.arpa
DNS Request
abruptyopsn.shop
DNS Request
wholersorie.shop
DNS Request
framekgirus.shop
DNS Request
framekgirus.shop
-
124 B 238 B 2 2
DNS Request
nearycrepso.shop
DNS Request
nearycrepso.shop
-
519 B 1.0kB 8 8
DNS Request
tirepublicerj.shop
DNS Request
noisycuttej.shop
DNS Request
rabidcowse.shop
DNS Request
cloudewahsj.shop
DNS Request
steamcommunity.com
DNS Response
104.103.247.162
DNS Request
sputnik-1985.com
DNS Response
104.21.16.1104.21.32.1104.21.80.1104.21.64.1104.21.96.1104.21.48.1104.21.112.1
DNS Request
162.247.103.104.in-addr.arpa
DNS Request
1.16.21.104.in-addr.arpa