Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe
Resource
win10v2004-20220812-en
General
-
Target
625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe
-
Size
919KB
-
MD5
c77967026ccd9d81ece516426f64acd2
-
SHA1
faf01bd21cc2c204e95a6e38792e67363d880a49
-
SHA256
625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0
-
SHA512
1c08c2b6815086c4e1556a546748ef3b294a17dff8fb3b8d55f964297df69b07ae28c7bc734cc6d799cee2c312c36f510dde8ed6c93a4ad74f3646435cbbed67
-
SSDEEP
24576:FatKCHU+RYm5rJsHQz1H+XBJLnjP/kYaGtW:FiRtl1e3rjP/kGt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4916 YShow3D.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 YShow3D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 444 wrote to memory of 4916 444 625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe 28 PID 444 wrote to memory of 4916 444 625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe 28 PID 444 wrote to memory of 4916 444 625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe"C:\Users\Admin\AppData\Local\Temp\625016c5204e2a963e472d4b6581d4c832137fc5a051b21cf39ba422d6a4f6e0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\YShow3D.exeC:\Users\Admin\AppData\Local\Temp\\YShow3D.exe /i ÕÒ²»µ½Ö¸¶¨µÄ¼ÓÃÜËø£¡ /t ÌáʾÐÅÏ¢£º /k 162⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5eb64ca55fbcc7110a81c388786074860
SHA1c85bea2ff7ef8a022e91944a2399eaec2e8839cf
SHA256c76af622a62baf2db999467f27602ddc57c458aee19d6517be6d4021b9260ab8
SHA512f8628a2deb7b5629c9f2536561cc7305c84800e6e2a7770201e20e0350fe24e6da2f38241f3bb74d6c14fe2763420873ae838237949ba2f239a4e83986aa4c94
-
Filesize
60KB
MD5eb64ca55fbcc7110a81c388786074860
SHA1c85bea2ff7ef8a022e91944a2399eaec2e8839cf
SHA256c76af622a62baf2db999467f27602ddc57c458aee19d6517be6d4021b9260ab8
SHA512f8628a2deb7b5629c9f2536561cc7305c84800e6e2a7770201e20e0350fe24e6da2f38241f3bb74d6c14fe2763420873ae838237949ba2f239a4e83986aa4c94