Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2025, 07:16
Behavioral task
behavioral1
Sample
Ps99 Duplicator.exe
Resource
win7-20241010-en
General
-
Target
Ps99 Duplicator.exe
-
Size
507KB
-
MD5
0b302e592f1cc0c5c10c15dbe7e7769d
-
SHA1
385e8478c5d84b41578bfddba235df3216ba9536
-
SHA256
d3c1cad594dc1780682c5360491589898c91a51732c78a66e2a41b0cb35b7d05
-
SHA512
20157b3cebd76db9d7ad7c32a1baede94bd656d75c2e29a9b9409a28ea89176cc68f8cc9acd46c701e4e38044c2d45585e7c930e42c16ce4fa994679ee4a6747
-
SSDEEP
12288:Flz+rW2k8wcin+TQj+PmrvW03cgzG9zl:bz+rQ8wcinWa+e
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 1176 Ps99 Duplicator.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1176 set thread context of 4804 1176 Ps99 Duplicator.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps99 Duplicator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3624 taskmgr.exe Token: SeSystemProfilePrivilege 3624 taskmgr.exe Token: SeCreateGlobalPrivilege 3624 taskmgr.exe Token: 33 3624 taskmgr.exe Token: SeIncBasePriorityPrivilege 3624 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe 3624 taskmgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83 PID 1176 wrote to memory of 4804 1176 Ps99 Duplicator.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ps99 Duplicator.exe"C:\Users\Admin\AppData\Local\Temp\Ps99 Duplicator.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD52ddb4c6c958ca0fa1c7660cc008aaa97
SHA1cc752c33263a14d3b8f3628e95bbc5f6902cc1fe
SHA25613b121790d2efdae6fd876e139834a09d3b400af0a7ff9298c0cd0c2184ea40f
SHA5126b7ef0fe105547b12e5adb6963d405ccfc69691b750c0dcdc581abfa03b79c8ef11fe754692a53e083405484d6c1eee20c0e175e52ce6d70553bcde50b702e05