Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2025, 22:04

General

  • Target

    quarantine/d2YQIJa.exe

  • Size

    2.0MB

  • MD5

    c51ea7f18b1f25150b3c6fe237ee63fd

  • SHA1

    17566341231ac3316c325a23cdaf9a3c766ebe11

  • SHA256

    55015b4080cea86f2e750440ff1bcabe87d2e0ffb35e4b940a385048c3e0535b

  • SHA512

    deceadf703491d36218f133475b93e834552838fee14a6de187167d4cc0dacdbb16bfa156650fdbc73a85fb9b86a2c84884c51be8caeffdb599ef091c0e5eba0

  • SSDEEP

    49152:AXAejEWyxSeJKr0e/BtUd5gbbu9jT7mhxpfSi:u5rt/B7bbu97mh

Malware Config

Extracted

Family

lumma

C2

https://mercharena.biz/api

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\quarantine\d2YQIJa.exe
    "C:\Users\Admin\AppData\Local\Temp\quarantine\d2YQIJa.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-0-0x0000000000D50000-0x0000000001208000-memory.dmp

    Filesize

    4.7MB

  • memory/2036-1-0x0000000077C30000-0x0000000077C32000-memory.dmp

    Filesize

    8KB

  • memory/2036-2-0x0000000000D51000-0x0000000000DAB000-memory.dmp

    Filesize

    360KB

  • memory/2036-4-0x0000000000D50000-0x0000000001208000-memory.dmp

    Filesize

    4.7MB

  • memory/2036-3-0x0000000000D50000-0x0000000001208000-memory.dmp

    Filesize

    4.7MB

  • memory/2036-32-0x0000000000D50000-0x0000000001208000-memory.dmp

    Filesize

    4.7MB

  • memory/2036-33-0x0000000000D50000-0x0000000001208000-memory.dmp

    Filesize

    4.7MB

  • memory/2036-34-0x0000000000D51000-0x0000000000DAB000-memory.dmp

    Filesize

    360KB