Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3luna-1.6.8.zip
windows7-x64
3luna-1.6.8.zip
windows10-2004-x64
10luna-1.6.8...er.zip
windows7-x64
1luna-1.6.8...er.zip
windows10-2004-x64
1Luna/Bootstrapper.exe
windows7-x64
1Luna/Bootstrapper.exe
windows10-2004-x64
1luna-1.6.8...g.json
windows7-x64
3luna-1.6.8...g.json
windows10-2004-x64
3luna-1.6.8/hash.txt
windows7-x64
1luna-1.6.8/hash.txt
windows10-2004-x64
8General
-
Target
luna-1.6.8.zip
-
Size
5.5MB
-
Sample
250204-stwlqs1rar
-
MD5
24fea6dd585a009c3ff441760beae097
-
SHA1
1920784c67ed8d49b611842b9643000aa0d8752c
-
SHA256
0359c34efaf6025a0dec1cf80b5bcbb9b20517be4bca8945af0391049ed2c134
-
SHA512
8f060951722ae1420812a36f12d64ded40de1797fdde3ac1591e143d9b3233174996cad0405eda36f3fc410e1abeb791d36a3a437bda2afcf4aaf1a2379f6f6a
-
SSDEEP
98304:gUZug/1mvXA/eiMVm7TZJ4xpQCQqoInFaGZV++7n0hTMuymld03bD0D1fd9kRUAU:FogNEziam71IpQgzF/ZE+7n4t1A330Dz
Static task
static1
Behavioral task
behavioral1
Sample
luna-1.6.8.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
luna-1.6.8.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
luna-1.6.8/Bootstrapper.zip
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
luna-1.6.8/Bootstrapper.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Luna/Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Luna/Bootstrapper.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
luna-1.6.8/config.json
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
luna-1.6.8/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
luna-1.6.8/hash.txt
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
luna-1.6.8/hash.txt
Resource
win10v2004-20250129-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Extracted
C:\Users\Admin\Downloads\r.wry
wannacry
Targets
-
-
Target
luna-1.6.8.zip
-
Size
5.5MB
-
MD5
24fea6dd585a009c3ff441760beae097
-
SHA1
1920784c67ed8d49b611842b9643000aa0d8752c
-
SHA256
0359c34efaf6025a0dec1cf80b5bcbb9b20517be4bca8945af0391049ed2c134
-
SHA512
8f060951722ae1420812a36f12d64ded40de1797fdde3ac1591e143d9b3233174996cad0405eda36f3fc410e1abeb791d36a3a437bda2afcf4aaf1a2379f6f6a
-
SSDEEP
98304:gUZug/1mvXA/eiMVm7TZJ4xpQCQqoInFaGZV++7n0hTMuymld03bD0D1fd9kRUAU:FogNEziam71IpQgzF/ZE+7n4t1A330Dz
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Infinitylock family
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
-
-
Target
luna-1.6.8/Bootstrapper.zip
-
Size
5.5MB
-
MD5
9ba94ac44294258328b5b23e6fbcaf4a
-
SHA1
3ef50da71c5800f02680733b184bb11bb0ca309b
-
SHA256
a9e76b770fb8a61f793a61ca6701e1f76ea95282d5a3647d8dfccf1b560f401a
-
SHA512
52e3118e8e40d621275d0ce3157138bb0e9a4d56c1c570666930de60e46e8050af8e0c377aea2e5ccee2ff78c427576bd4954226a0f800eac6cabbaa70f267ce
-
SSDEEP
98304:HUxBxVYLNchCiExF8pIV/hIy3D25GmoQ5ReIpL6Xh+SC+rnM/BnspjhlvkHeBA:0/biriUei/+boQ5EIpLoznI/tsp1lsHr
Score1/10 -
-
-
Target
Luna/Bootstrapper.exe
-
Size
9.4MB
-
MD5
f2a6133b7f38fc49f792ae799d1b4750
-
SHA1
6bef46ddde325f45a0e9ff123112c96bbd47c795
-
SHA256
37bde6655e1272e159b9c2e3a7eee3f4e9a837c0f04240645d3991d112287f8d
-
SHA512
f9611bed83b4bce1841868880a42dacb6b8f7e8859be1d85b3c8d3a365a0244566cbfb12294c7b2c82b15d6c0e47095d8246a95d522c3a064a0d8511b2411254
-
SSDEEP
98304:UHuETr54/xXEPmZM8l2EKSxOyFOiC0YYWtS7tkk6Q9SFxVLUeRF:2pIxXoSTlzdFfCtlIZ/9iZX
Score1/10 -
-
-
Target
luna-1.6.8/config.json
-
Size
127B
-
MD5
7fd96c6b742155f97e726cc3cd30659b
-
SHA1
ce5a0469f6eced916931de46fa65b2efd7b7318c
-
SHA256
1d5786aa530af255c9e5267e3637db5898953c849a1be1250eba156823e84a10
-
SHA512
905505bff84af6370ff235ce2e49752320e2f62081981098011c672da2225f736d07410a5fdd37ca4133cb1ad1dd0547e8b5c0125698964186e02df3ad1a8434
Score3/10 -
-
-
Target
luna-1.6.8/hash.txt
-
Size
66B
-
MD5
663c32ed37147c98b24dcbd7219d3d34
-
SHA1
d5d4db10a72908522dd2977974e119f637b3e39b
-
SHA256
0e19a151b264885cdc2cb427e4c4acd296e7a184b380e3302d1eb2bf099c3d92
-
SHA512
784910780e05398e5a5bfcc8d11e190a1537a9f61b7b95beefc72137a77fbbf0f2e4a6e2b1fd49aeb9108318b83dbceb725e980cf7be686c42cb93eb51f6f091
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
7System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1