Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe
Resource
win10v2004-20220812-en
General
-
Target
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe
-
Size
157KB
-
MD5
96e3f8c7566d2e0a9abc560c261d2969
-
SHA1
1ce481a9206eb3cf208cb36018b37882a9f83e64
-
SHA256
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853
-
SHA512
38a050e67712538123825a86b0439a4d68e91fac1331bf7367825b32cffc503352352b055f284e9aafad1f9a77c99a2acb68b22ff85b69c11253ca44dc1d64e8
-
SSDEEP
3072:TpCjtzxD3F0DcmcIn+STVR8fNdUfZKcsgzG9tniBh5NJ3l:azAcdIVxmzGZ1FzGPnet
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4808 Ysoqya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File created C:\Windows\Ysoqya.exe f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File opened for modification C:\Windows\Ysoqya.exe f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ysoqya.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ysoqya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main Ysoqya.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\International Ysoqya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe 4808 Ysoqya.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4944 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 4808 Ysoqya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4808 4944 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 81 PID 4944 wrote to memory of 4808 4944 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 81 PID 4944 wrote to memory of 4808 4944 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe"C:\Users\Admin\AppData\Local\Temp\f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\Ysoqya.exeC:\Windows\Ysoqya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD5481335c6855e5f69c35d7cabc0dedfaa
SHA160543a10dc8541c973931c4e6af12975a4354126
SHA2569df97b21f0618fafd1d0a0835a141330a41d27f76e31e82acf1009c73ba6d264
SHA51207c412d05dd5306aa4ba3e293eb977cb16bc00a54f1ca5b360260c9840204d2c6bdcdb70c0fad36141d04632d24f5f2ad1680968f8409dbd9e272e2c8a69702f
-
Filesize
157KB
MD596e3f8c7566d2e0a9abc560c261d2969
SHA11ce481a9206eb3cf208cb36018b37882a9f83e64
SHA256f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853
SHA51238a050e67712538123825a86b0439a4d68e91fac1331bf7367825b32cffc503352352b055f284e9aafad1f9a77c99a2acb68b22ff85b69c11253ca44dc1d64e8
-
Filesize
157KB
MD596e3f8c7566d2e0a9abc560c261d2969
SHA11ce481a9206eb3cf208cb36018b37882a9f83e64
SHA256f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853
SHA51238a050e67712538123825a86b0439a4d68e91fac1331bf7367825b32cffc503352352b055f284e9aafad1f9a77c99a2acb68b22ff85b69c11253ca44dc1d64e8