Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/01/2025, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
Salex.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
SalexLoader.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
antiban.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
config1.cfg
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
config2.cfg
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
engine.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
wincr.dll
Resource
win11-20241007-en
General
-
Target
Salex.rar
-
Size
489KB
-
MD5
35027836f30a27f95f89464f4002cf47
-
SHA1
ad8b206ebd77787915928990042185318ed4d1cc
-
SHA256
d820a2843c4dd04b3fb075d45c9f7953f90a97e87a97f934212f4ff74253cd4c
-
SHA512
9c7bf22dfe29a628862d633931a3021433fe4fb2565ede170596a9ae47447230a8ecfd2d150f3dc0c602159227f9152f84ea80a7a3c5e12c134f12e16094fb4e
-
SSDEEP
12288:nqeB8sdAaFgh4VUPLUwi9FYftVKwXZ8UK0BPWt29:nqfaFgyVmAwinYftVVXrdK29
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 4 IoCs
pid Process 3752 SalexLoader.exe 1412 SalexLoader.exe 4036 SalexLoader.exe 1048 SalexLoader.exe -
Loads dropped DLL 3 IoCs
pid Process 1412 SalexLoader.exe 4036 SalexLoader.exe 1048 SalexLoader.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SalexLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SalexLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SalexLoader.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3024 7zFM.exe 3024 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3024 7zFM.exe Token: 35 3024 7zFM.exe Token: SeSecurityPrivilege 3024 7zFM.exe Token: SeSecurityPrivilege 3024 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3024 7zFM.exe 3024 7zFM.exe 3024 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3752 3024 7zFM.exe 77 PID 3024 wrote to memory of 3752 3024 7zFM.exe 77 PID 3024 wrote to memory of 3752 3024 7zFM.exe 77
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Salex.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\7zO0DB08D87\SalexLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO0DB08D87\SalexLoader.exe"2⤵
- Executes dropped EXE
PID:3752
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2968
-
C:\Users\Admin\Desktop\chest\SalexLoader.exe"C:\Users\Admin\Desktop\chest\SalexLoader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1412
-
C:\Users\Admin\Desktop\chest\SalexLoader.exe"C:\Users\Admin\Desktop\chest\SalexLoader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4036
-
C:\Users\Admin\Desktop\chest\SalexLoader.exe"C:\Users\Admin\Desktop\chest\SalexLoader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1048
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:2360